Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-34177 | The Frontend File Manager plugin for WordPress is vulnerable to Unauthenticated HTML Injection in versions up to, and including, 18.2. This is due to lacking authentication protections on the wpfm_send_file_in_email AJAX action. This makes it possible for unauthenticated attackers to send emails using the site with a custom subject, recipient email, and body with unsanitized HTML content. This effectively lets the attacker use the site as a spam relay. |
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Frontend File Manager <= 18.2 - Unauthenticated HTML Injection leading to Spam Emails |
Sat, 28 Dec 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:50:23.480Z
Reserved: 2023-06-06T12:40:12.785Z
Link: CVE-2021-4350
Updated: 2024-08-03T17:23:10.534Z
Status : Modified
Published: 2023-06-07T02:15:13.730
Modified: 2026-04-08T18:17:14.590
Link: CVE-2021-4350
No data.
OpenCVE Enrichment
No data.
EUVD