CVE-2025-3234
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-14

Last updated on: 2025-06-16

Assigner: Wordfence

Description
The File Manager Pro – Filester plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 1.8.8. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. Administrators have the ability to extend file manager usage privileges to lower-level users including subscribers, which would make this vulnerability more severe on such sites.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-14
Last Modified
2025-06-16
Generated
2026-05-07
AI Q&A
2025-06-14
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-3234 is a critical vulnerability in the File Manager Pro – Filester WordPress plugin (version 1.8.8 and earlier) that allows authenticated users with Administrator-level access or higher to upload arbitrary files to the server. This happens because the plugin lacked proper file type validation and sufficient input sanitization, enabling attackers to upload potentially malicious files. The vulnerability could be more severe if administrators extend file manager privileges to lower-level users. The issue was fixed in version 1.8.9 by improving input sanitization, adding file type validation, verifying security tokens, and other security enhancements. [1]


How can this vulnerability impact me? :

This vulnerability can allow attackers with administrator or elevated privileges to upload arbitrary files to the affected WordPress site’s server. This could lead to remote code execution, enabling attackers to run malicious code, compromise the website, steal data, or take control of the server. If file manager privileges are extended to lower-level users, the risk and impact increase significantly. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can focus on identifying if the vulnerable Filester plugin version (1.8.8 or earlier) is installed on your WordPress site. You can check the plugin version via the WordPress admin dashboard or by inspecting the plugin files. Additionally, monitoring for suspicious file uploads or unexpected files on the server may indicate exploitation attempts. Since the vulnerability requires authenticated Administrator-level access, reviewing user activity logs for unusual file upload actions is recommended. Specific commands to check plugin version or files include: 1) Using WP-CLI: `wp plugin list` to see installed plugin versions. 2) Searching for recently uploaded files in the uploads directory: `find wp-content/uploads -type f -mtime -7` (files modified in the last 7 days). 3) Checking web server logs for POST requests to the Filester upload endpoints. However, no explicit commands for detection are provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update the Filester WordPress plugin to version 1.8.9 or later, which contains the fix for this vulnerability. The update includes improved input sanitization, file type validation to prevent arbitrary file uploads, nonce verification to prevent CSRF, and other security enhancements. Additionally, review user privileges to ensure only trusted users have Administrator-level access, and consider restricting file manager usage privileges to minimize risk. Monitoring and auditing file uploads and user activities can also help mitigate exploitation. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart