The Frontend File Manager Plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 23.4. This is due to the plugin not validating file ownership before processing file rename requests in the '/wpfm/v1/file-rename' REST API endpoint. This makes it possible for authenticated attackers, with Subscriber-level access and above, to rename files uploaded by other users via the 'fileid' parameter.
We have discovered 15 live websites that are affected by CVE-2025-13382.
| Product | |
| Category | Wordpress Plugins |
| Vulnerable Domains | 15 live websites (100% of Nmedia User File Uploader install base) |
| Vulnerable Versions |
|
| Vulnerable Versions Count | 1 versions ( 100% of all versions) |
| 6 websites | |
| 2 websites | |
| 2 websites | |
| 1 websites | |
| 1 websites | |
| 1 websites | |
| 1 websites | |
| 1 websites |
| .com | 5 websites |
| .it | 2 websites |
| .com.au | 1 websites |
| .nl | 1 websites |
| .org | 1 websites |
| .ru | 1 websites |
| Domain | Country | Rank | Contacts |
|---|---|---|---|
| ******.org | *,***,*** | ||
| *************.com | *,***,*** | ||
| *****.ru | **,***,*** | ||
| ***********.com | **,***,*** | ||
| ********.biz | **,***,*** | ||
| ****************.com | **,***,*** | ||
| *************.nl | **,***,*** | ||
| ***********.***.vn | **,***,*** | ||
| **************.com | **,***,*** | ||
| ************.com | **,***,*** |
FAQ