CVE-2020-25213
CRITICAL KEV NUCLEIWordPress File Manager Unauthenticated Remote Code Execution
Title source: metasploitDescription
The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.
Exploits (11)
nomisec
WORKING POC
58 stars
by mansoorr123 · remote
https://github.com/mansoorr123/wp-file-manager-CVE-2020-25213
nomisec
WORKING POC
6 stars
by BLY-Coder · remote
https://github.com/BLY-Coder/Python-exploit-CVE-2020-25213
metasploit
WORKING POC
NORMAL
by Alex Souza (w4fz5uck5) · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_file_manager_rce.rb
Nuclei Templates (1)
WordPress File Manager Plugin - Remote Code Execution
CRITICALby foulenzer
References (10)
Scores
CVSS v3
10.0
EPSS
0.9440
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2021-11-03
VulnCheck KEV
2020-09-09
InTheWild.io
2020-11-10
ENISA EUVD
EUVD-2020-17903
Classification
CWE
CWE-434
Status
published
Affected Products (1)
filemanagerpro/file_manager
< 6.9
Timeline
Published
Sep 09, 2020
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026