Frontend File Manager Plugin - Authentication Bypass (CVE-2022-3124)
191Exploiting IPs reported
The Frontend File Manager Plugin WordPress plugin before 21.3 allows any unauthenticated user to rename uploaded files from users. Furthermore, due to the lack of validation in the destination filename, this could allow allow them to change the content of arbitrary files on the web server
CrowdSec analysis
CVE-2022-3124 is a vulnerability in the Frontend File Manager Plugin for WordPress that allows unauthenticated users to rename uploaded files and potentially modify the content of arbitrary files on the web server. This flaw could be exploited by attackers to tamper with website files, leading to possible defacement or further compromise of the site’s integrity.
CrowdSec has been tracking this vulnerability and its exploits since 24th of September 2025.
Data from the CrowdSec community indicates that exploitation of CVE-2022-3124 is highly selective and intelligence-driven. Threat actors use advanced reconnaissance and carefully choose their targets, often as part of sophisticated campaigns or advanced persistent threat operations. CrowdSec data also reveals a clear uptick in attacks involving CVE-2022-3124 over the past week. Activity is above the usual baseline, suggesting growing attention from attackers. This may reflect rising awareness, recent exploit releases, or expanded targeting efforts.
Attackers exploit the /wp-json/wpfm/v1/file-rename
endpoint to rename files by supplying crafted filename
parameters, often using directory traversal sequences to target arbitrary files on WordPress installations.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.