CVE-2024-34438
Awaiting Analysis Awaiting Analysis - Queue
Missing Authorization in Anssi Laitila Shared Files

Publication date: 2026-02-20

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Missing Authorization vulnerability in Anssi Laitila Shared Files shared-files.This issue affects Shared Files: from n/a through <= 1.7.19.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-20
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2026-02-20
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
tammersoft shared_files to 1.7.19 (inc)
anssi_laitila shared_files to 1.7.19 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2024-34438 is a broken access control vulnerability found in the WordPress Shared Files Plugin versions up to and including 1.7.19.

This issue arises from missing authorization, authentication, or nonce token checks in certain functions, allowing unauthenticated users to perform actions that require higher privileges.

It is classified under the OWASP Top 10 category A1: Broken Access Control.


How can this vulnerability impact me? :

This vulnerability allows unauthenticated users to perform actions that normally require higher privileges, potentially leading to unauthorized access or modification of shared files.

However, the CVSS severity score is 5.3, indicating a low severity impact, and it is considered unlikely to be exploited in a way that causes significant harm.

Users are advised to update to version 1.7.20 or later to mitigate the risk.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is a broken access control issue in the WordPress Shared Files Plugin versions up to 1.7.19, caused by missing authorization checks.

To detect this vulnerability on your system, you can check the installed version of the Shared Files plugin in your WordPress environment.

  • Use the WordPress admin dashboard to verify the plugin version under Plugins > Installed Plugins.
  • Alternatively, use WP-CLI commands such as: wp plugin list | grep shared-files to identify the installed version.

Since the vulnerability involves missing authorization, monitoring for unauthorized access attempts or unusual actions related to the Shared Files plugin may also help detect exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to update the WordPress Shared Files plugin to version 1.7.20 or later, where the vulnerability has been patched.

If automatic updates are available through Patchstack, enabling them can provide rapid protection.

Additionally, review and restrict access permissions to the Shared Files plugin functions to minimize the risk of unauthorized actions.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart