Back to VulnFeed / CVE-2026-5337
root@hackertop:~/vulnfeed/CVE-2026-5337#
CVE-2026-5337 MEDIUM CVE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

Frontend File Manager Plugin up to 23.6 on WordPress Download Endpoint wpfm_download file_id authorization

Frontend File Manager Plugin 18d ago Impact pending confirmation
LIFECYCLE
4.3 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability, which was classified as problematic, was found in Frontend File Manager Plugin up to 23.6 on WordPress (WordPress Plugin). Affected is the function wpfm_download of the component Download Endpoint. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Root Cause Analysis
The manipulation of the argument file_id with an unknown input leads to a unknown weakness. CWE is classifying the issue as CWE-639. The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.

Impact: This is going to have an impact on confidentiality.

Countermeasure: There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-5337 · CVSS 4.3 · Active Threat