CVE-2024-5599

The FileOrganizer – Manage WordPress and Website Files plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.7 via the 'fileorganizer_ajax_handler' function. This makes it possible for unauthenticated attackers to extract sensitive data including backups or other sensitive information if the files have been moved to the built-in Trash folder.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fileorganizer:fileorganizer:*:*:*:*:*:wordpress:*:*

History

11 Jun 2024, 18:24

Type Values Removed Values Added
First Time Fileorganizer
Fileorganizer fileorganizer
References () https://plugins.trac.wordpress.org/changeset/3098763/ - () https://plugins.trac.wordpress.org/changeset/3098763/ - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/78e7b65d-91f8-477e-b992-3148c1b65d7b?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/78e7b65d-91f8-477e-b992-3148c1b65d7b?source=cve - Third Party Advisory
References () https://plugins.trac.wordpress.org/browser/fileorganizer/trunk/main/ajax.php#L85 - () https://plugins.trac.wordpress.org/browser/fileorganizer/trunk/main/ajax.php#L85 - Product
CPE cpe:2.3:a:fileorganizer:fileorganizer:*:*:*:*:*:wordpress:*:*
CWE NVD-CWE-noinfo

07 Jun 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-07 13:15

Updated : 2024-06-11 18:24


NVD link : CVE-2024-5599

Mitre link : CVE-2024-5599


JSON object : View

Products Affected

fileorganizer

  • fileorganizer