CVE-2025-53260
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-27

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Unrestricted Upload of File with Dangerous Type vulnerability in getredhawkstudio File Manager Plugin For Wordpress file-manager-plugin-for-wordpress allows Upload a Web Shell to a Web Server.This issue affects File Manager Plugin For Wordpress: from n/a through <= 7.5.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-27
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2025-06-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the WordPress File Manager Plugin (up to version 7.5) allows an attacker with administrator privileges to upload any type of file, including malicious web shells, to the website. This arbitrary file upload can enable the attacker to execute backdoors and gain further unauthorized access to the web server. It is classified as an injection vulnerability with a high severity CVSS score of 9.1. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker to upload and execute malicious files on your web server, potentially leading to full compromise of the website. This includes unauthorized access, data theft, defacement, or further attacks on the server. However, exploitation requires administrator privileges, which reduces the likelihood but does not eliminate the risk. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection involves scanning the server for uploaded malicious files such as web shells. Since the vulnerability allows arbitrary file uploads by administrators, checking for unexpected or suspicious files in upload directories is recommended. Server-side malware scanning tools should be used rather than plugin-based scanners, as the latter can be tampered with by malware. Specific commands are not provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation includes deploying virtual patching (vPatching) provided by Patchstack to auto-mitigate the vulnerability in the absence of an official fix. Additionally, restrict administrator privileges carefully, perform professional incident response if compromise is suspected, and conduct server-side malware scanning. Avoid relying solely on plugin-based malware scanners. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart