CVE-2024-34438
Missing Authorization in Anssi Laitila Shared Files
Publication date: 2026-02-20
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tammersoft | shared_files | to 1.7.19 (inc) |
| anssi_laitila | shared_files | to 1.7.19 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2024-34438 is a broken access control vulnerability found in the WordPress Shared Files Plugin versions up to and including 1.7.19.
This issue arises from missing authorization, authentication, or nonce token checks in certain functions, allowing unauthenticated users to perform actions that require higher privileges.
It is classified under the OWASP Top 10 category A1: Broken Access Control.
How can this vulnerability impact me? :
This vulnerability allows unauthenticated users to perform actions that normally require higher privileges, potentially leading to unauthorized access or modification of shared files.
However, the CVSS severity score is 5.3, indicating a low severity impact, and it is considered unlikely to be exploited in a way that causes significant harm.
Users are advised to update to version 1.7.20 or later to mitigate the risk.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability is a broken access control issue in the WordPress Shared Files Plugin versions up to 1.7.19, caused by missing authorization checks.
To detect this vulnerability on your system, you can check the installed version of the Shared Files plugin in your WordPress environment.
- Use the WordPress admin dashboard to verify the plugin version under Plugins > Installed Plugins.
- Alternatively, use WP-CLI commands such as: wp plugin list | grep shared-files to identify the installed version.
Since the vulnerability involves missing authorization, monitoring for unauthorized access attempts or unusual actions related to the Shared Files plugin may also help detect exploitation attempts.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to update the WordPress Shared Files plugin to version 1.7.20 or later, where the vulnerability has been patched.
If automatic updates are available through Patchstack, enabling them can provide rapid protection.
Additionally, review and restrict access permissions to the Shared Files plugin functions to minimize the risk of unauthorized actions.