
Cloud Vulnerability DB
A community-led vulnerabilities database
The Media from FTP WordPress plugin (versions before 11.17) contains a critical security vulnerability (CVE-2023-4019) that was discovered in August 2023. The vulnerability stems from improper access control mechanisms that allow users with author-level privileges or higher to manipulate files within the WordPress installation (WPScan).
The vulnerability is characterized by incorrect authorization implementation in the plugin's file handling functionality. The issue allows authenticated users with author or higher privileges to move files arbitrarily within the system through the plugin's interface. The vulnerability has received a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating its critical nature (NVD).
The vulnerability's exploitation could lead to Remote Code Execution (RCE) in certain scenarios. Attackers could potentially access and manipulate sensitive files, including wp-config.php, which contains critical WordPress configuration details. This level of access could compromise the entire WordPress installation (WPScan).
The vulnerability has been patched in version 11.17 of the Media from FTP plugin. Site administrators are strongly advised to update to this version or later to protect against potential exploitation. It's worth noting that while version 11.16 attempted to address the issue by implementing the manage_options capability check, this fix was insufficient for MultiSite setups (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."