Frontend File Manager Plugin <= 23.4 - Insecure Direct Object Reference to Authenticated (Subscriber+) Arbitrary File Renaming
The Frontend File Manager Plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 23.4. This is due to the plugin not validating file ownership before processing file rename requests in the '/wpfm/v1/file-rename' REST API endpoint. This makes it possible for authenticated attackers, with Subscriber-level access and above, to rename files uploaded by other users via the 'fileid' parameter.
CVE-2025-13382 is a medium severity with CVSS 4.3 Authorization Bypass issue affecting the Plugin Frontend File Manager Plugin. It affects Versions up to 23.4 and is fixed in 23.5.
CVE-2025-13382 is tracked for the Plugin Frontend File Manager Plugin as medium severity with CVSS 4.3. The affected range is Versions up to 23.4. Update Frontend File Manager Plugin to 23.5 or newer where that version is compatible with the site.
| Software Type | Plugin |
|---|---|
| Software Slug |
nmedia-user-file-uploader
View on wordpress.org
|
| CVE | CVE-2025-13382 |
| Patched Versions |
23.5
|
| Affected Versions |
Versions up to 23.4
|
Related CVEs for Frontend File Manager Plugin
These internal links group the same WordPress plugin by CVE, issue type, severity, and patch status so operators and search engines can connect the full vulnerability cluster.
Frontend File Manager <= 18.2 - Authenticated Settings Change leading to Arbitrary File Upload
Frontend File Manager Plugin <= 22.5 - Authenticated (Editor+) Directory Traversal
Frontend File Manager <= 18.2 - Unauthenticated Arbitrary File Download
Frontend File Manager Plugin <= 21.2 - Cross-Site Request Forgery to File Upload
Frontend File Manager <= 21.2 - Authenticated (Subscriber+) Arbitrary File Upload
Frontend File Manager Plugin < 3.6 - Arbitrary File Upload
Frontend File Manager <= 23.4 - Authenticated (Subscriber+) Arbitrary File Deletion
Frontend File Manager Plugin <= 23.5 - Missing Authorization to Unauthenticated Arbitrary File Sharing via 'file_id' Parameter
This record contains material that is subject to copyright
License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. Read more
License: CVE Usage: MITRE hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute Common Vulnerabilities and Exposures (CVE®). Any copy you make for such purposes is authorized provided that you reproduce MITRE's copyright designation and this license in any such copy. Read more