Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total4
Critical0
High3
Medium1
Reset
Showing 1-4 of 4 records
Threat Entry Updated 2024-12-10

CVE-2024-11010 - Manage Wordpress And Website Files Plugin

The FileOrganizer – Manage WordPress and Website Files plugin for WordPress is vulnerable to Local JavaScript File Inclusion in all versions up to, and including, 1.1.4 via the 'default_lang' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary JavaScript files on the server, allowing the execution of any JavaScript code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and…

PLUGIN Manage Wordpress And Website Files

CVE-2024-11010

HIGH CVSS 7.2 2024-12-07
Threat Entry Updated 2024-11-08

CVE-2024-7985 - Manage Wordpress And Website Files Plugin

The FileOrganizer – Manage WordPress and Website Files plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the "fileorganizer_ajax_handler" function in all versions up to, and including, 1.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, and permissions granted by an administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: The FileOrganizer Pro plugin must be installed and active to allow Subscriber+ users to upload files.

PLUGIN Manage Wordpress And Website Files

CVE-2024-7985

HIGH CVSS 7.5 2024-10-29
Threat Entry Updated 2024-11-21

CVE-2024-5599 - Manage Wordpress And Website Files Plugin

The FileOrganizer – Manage WordPress and Website Files plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.7 via the 'fileorganizer_ajax_handler' function. This makes it possible for unauthenticated attackers to extract sensitive data including backups or other sensitive information if the files have been moved to the built-in Trash folder.

PLUGIN Manage Wordpress And Website Files

CVE-2024-5599

HIGH CVSS 7.5 2024-06-07
Threat Entry Updated 2025-03-13

CVE-2024-2324 - Manage Wordpress And Website Files Plugin

The FileOrganizer – Manage WordPress and Website Files plugin for WordPress is vulnerable to Stored Cross-Site Scripting via svg file upload in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. For the free version, this is limited to administrators. The pro version is also vulnerable and exploitable by administrators, but also offers the functionality to lower level users (as…

PLUGIN Manage Wordpress And Website Files

CVE-2024-2324

MEDIUM CVSS 4.4 2024-05-02
Scroll to top