Frontend File Manager Plugin Vulnerability (Medium) – CVE-2026-0829

Frontend File Manager Plugin Vulnerability (Medium) – CVE-2026-0829

by | Feb 24, 2026 | Plugins

Attack Vectors

CVE-2026-0829 affects the Frontend File Manager WordPress plugin (slug: nmedia-user-file-uploader) in versions up to and including 23.5. The issue is rated Medium severity (CVSS 5.3, vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).

Because the vulnerability can be exploited over the network and does not require a logged-in user, an unauthenticated attacker could target any site where this plugin is installed and exposed. This typically increases risk for public-facing marketing sites where attackers routinely scan for known plugin versions and attempt automated exploitation.

Reference: CVE-2026-0829 record and the source disclosure from Wordfence Threat Intelligence.

Security Weakness

The Frontend File Manager plugin is vulnerable due to a missing authorization (capability) check on a function in versions up to, and including, 23.5. In plain terms, the plugin does not consistently verify that a request is allowed before performing an action.

This class of weakness is especially concerning for business stakeholders because it can bypass normal access controls—meaning a person who should have no access at all may still trigger a plugin action.

At the time of the referenced advisory, there is no known patch available. Organizations should decide mitigations based on risk tolerance, including whether to remove and replace the software.

Technical or Business Impacts

While the disclosed details indicate the impact is primarily related to unauthorized actions (integrity impact is noted; confidentiality and availability are not), this can still create meaningful business risk. Unauthorized actions can lead to unexpected site changes, workflow disruption for marketing teams, and increased operational overhead for IT and compliance.

For marketing directors and executives, the most common business outcomes include: loss of trust if site behavior changes unexpectedly, delays to campaign launches due to emergency maintenance, and compliance or audit concerns if unauthorized activity affects regulated content, approvals, or record-keeping processes.

Recommended mitigations (given no known patch): consider uninstalling the affected Frontend File Manager plugin (nmedia-user-file-uploader) and replacing it with a supported alternative; if removal is not immediately possible, reduce exposure by limiting where and how the functionality is used, tightening administrative access, monitoring for unexpected changes, and increasing alerting around plugin activity. Ensure you have reliable backups and a tested restore process to minimize downtime if unauthorized changes occur.

Similar attacks (real examples): authorization and access-control gaps in WordPress ecosystems have been widely exploited, such as the CVE-2020-11738 “duplicator” plugin issue and the CVE-2021-25036 “WP User Avatar” / “ProfilePress” related vulnerability class. These incidents illustrate how attackers routinely target plugin authorization weaknesses to perform actions they shouldn’t be able to perform.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers