[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fZBXHPVwoxCU6_oSNClRAs-POpnoKCt01t72EMILLo-4":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2025-9345","file-manager-code-editor-and-backup-by-managefy-authenticated-admin-path-traversal-to-arbitrary-file-download","File Manager, Code Editor, and Backup by Managefy \u003C= 1.4.8 - Authenticated (Admin+) Path Traversal to Arbitrary File Download","The File Manager, Code Editor, and Backup by Managefy plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.4.8 via the ajax_downloadfile() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory.","softdiscover-db-file-manager",null,"\u003C=1.4.8","1.5.0","medium",4.9,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","2025-08-27 14:40:26","2025-08-28 03:42:47",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Ff53cf99e-3136-4a1d-bbbd-ff484f1df5c3?source=api-prod",1]