CVE-2021-34638

WordPress Download Manager <= 3.1.24 - Cross-Site Scripting

mediumImproper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
6.5
CVSS Score
6.5
CVSS Score
medium
Severity
3.1.25
Patched in
908d
Time to patch

Description

Authenticated Directory Traversal in WordPress Download Manager <= 3.1.24 allows authenticated (Contributor+) users to obtain sensitive configuration file information, as well as allowing Author+ users to perform XSS attacks, by setting Download template to a file containing configuration information or an uploaded JavaScript with an image extension This issue affects: WordPress Download Manager version 3.1.24 and prior versions.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
High
Confidentiality
None
Integrity
None
Availability

Technical Details

Affected versions<=3.1.24
PublishedJuly 29, 2021
Last updatedJanuary 22, 2024
Affected plugindownload-manager

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.