Sploit.io - Search

Product: n-media_post_front-end_form, version: <= 1.0

CVE-2016-15042

Severity: CRITICAL

Description: The Frontend File Manager (versions < 4.0), N-Media Post Front-end Form (versions < 1.1) plugins for WordPress are vulnerable to arbitrary file uploads due to missing file type validation via the `nm_filemanager_upload_file` and `nm_postfront_upload_file` AJAX actions. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.

CVSS Score: 9.8

Priority

A+

CISA Data

EPSS Data

  • EPSS: 0.738540000
  • Percentile: 0.988090000
  • Date: 2026-03-26

ExploitDB

No data available.

HackerOne Data

  • Rank: 8973
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

Affected Products:

  • nmedia N-Media Post Front-end Form - Versions: *
  • nmedia Frontend File Manager Plugin - Versions: *

References:

Risk Assessment

1. Risk Assessment
The vulnerability, CVE-2016-15042, presents a critical risk to WordPress websites utilizing the Frontend File Manager (versions less than 4.0) or N-Media Post Front-end Form (versions less than 1.1) plugins. The core issue is a lack of proper file type validation during file uploads via the `nm_filemanager_upload_file` and `nm_postfront_upload_file` AJAX actions. This allows unauthenticated attackers to upload arbitrary files, including potentially malicious ones like PHP scripts. The likelihood of exploitation is high, as the vulnerability is easily exploitable and doesn’t require authentication. The ease of exploitation is also high, with existing proof-of-concept exploits readily available. The impact on confidentiality is high as attackers can potentially read sensitive files. Integrity is also high, as attackers can overwrite existing files or inject malicious code. Availability is high, as a successfully uploaded and executed PHP script could lead to a denial of service or complete compromise of the web server. The EPSS score of 0.738540000 indicates a substantial probability of exploitation.

2. Potential Attack Scenarios
An attacker could leverage this vulnerability to upload a PHP webshell to the WordPress server. The attack vector is a direct HTTP request to the WordPress site, targeting the AJAX endpoints responsible for file uploads. The attack process involves sending a crafted HTTP POST request with the malicious PHP file disguised with a common image extension (e.g., .jpg or .png). The lack of file type validation allows the server to accept the PHP file. The attacker can then access the uploaded webshell via a web browser, granting them remote code execution on the server. Potential outcomes include full server compromise, data exfiltration, defacement of the website, or the installation of malware. The attacker can then use this access to potentially move laterally within the network if the WordPress server has access to other systems.

3. Mitigation Recommendations
The primary mitigation is to update the affected plugins to the latest versions. Frontend File Manager should be upgraded to version 4.0 or later, and N-Media Post Front-end Form should be upgraded to version 1.1 or later. These updates include proper file type validation, preventing arbitrary file uploads. Immediate patching is crucial, as the vulnerability is easily exploitable. Website administrators should also consider the following: Regularly scan WordPress sites for vulnerabilities using tools like WPScan or Wordfence. Implement Web Application Firewall (WAF) rules to filter potentially malicious file uploads. Review file upload permissions to ensure uploaded files are not executable by default. Monitor server logs for unusual activity, such as the creation of new PHP files in upload directories. Relevant resources include: Wordfence: https://www.wordfence.com/threat-intel/vulnerabilities/id/2c1e6298-f243-49a5-b1b7-52bd6a6c8858?source=cve and the WordPress plugin repositories for the latest versions of the plugins.

4. Executive Summary
CVE-2016-15042 represents a critical vulnerability affecting WordPress websites using the Frontend File Manager or N-Media Post Front-end Form plugins. This vulnerability allows attackers to upload malicious files to your website, potentially leading to complete server compromise, data theft, or website defacement. The vulnerability is easily exploited, even without a user account, making it a significant risk. Updating the affected plugins to the latest versions is the most effective mitigation. Prompt action is essential to protect your website and the data it contains. Failure to address this vulnerability could result in significant business disruption and potential financial loss. This is a high priority issue that should be addressed immediately by your IT or web development team.