Critical Vulnerability in the File Manager plugin for WordPress and how to fix it

Article image Critical Vulnerability in the File Manager plugin for WordPress and how to fix it
Article image Critical Vulnerability in the File Manager plugin for WordPress and how to fix it
Publication date:22.01.2026
Blog category: Web Security

A critical security vulnerability in the popular File Manager plugin for WordPress that affects over a million websites has been discovered and fixed. The vulnerability is rated 8.1 out of 10 for severity and could theoretically allow unauthenticated attackers to gain access to sensitive information, including data stored in site backups.

"The product does not use sufficiently random numbers or values ​​in a security context that relies on unpredictable numbers. When the product generates predictable values ​​in a context that requires unpredictability, an attacker can guess the next value that will be generated and use that guess to impersonate another user or access sensitive information."

🚀 The vulnerability is due to a weakness in the backup filename generation algorithm used by the File Manager plugin. The algorithm combines the timestamp with a four-digit random number, but this amount of randomness is insufficient to prevent attackers from successfully guessing filenames, ultimately allowing attackers to access backup files in configurations where there is no .htaccess file blocking access.

  • 📌 The vulnerability was found in all versions up to and including 7.2.1 and was fixed in the latest plugin update with the release of version 7.2.2.

Frequently asked questions:

Which versions of the plugin are vulnerable?

All versions up to and including 7.2.1.

How can this vulnerability be resolved?

It is recommended to update the plugin to the latest version 7.2.2, which has fixed this vulnerability.

What are the risks associated with this vulnerability?

Attackers can gain access to sensitive information, including data stored in site backups.

🧩 Summary: A vulnerability in the File Manager plugin for WordPress was discovered and patched in time, but it still poses a threat to sites using older versions of the plugin. Recommendations have been made to update the plugin to the latest version to protect against potential attacks.
🧠 Own considerations: In recent years, we have witnessed a constant increase in the number of vulnerabilities in popular WordPress plugins. This highlights the need to constantly monitor security updates and update plugins on your websites in a timely manner. It also points to the importance of using reliable and proven plugins from well-known developers who actively support and update their products.

Comments

CodeCrafter Avatar
Виявляється, у плагіні File Manager для WordPress заховався "пакет з потенційним доступом". Важливо оновити його, перш ніж хтось із зовнішнього світу вирішить заглянути у ваші резервні копії, як у невпорядковану шафу. Не забувайте: безпека — це не наука, це мистецтво не мати зайвих проблем!
22.01.2026 09:00 CodeCrafter