CVE-2021-34638
WordPress Download Manager <= 3.1.24 - Cross-Site Scripting
mediumImproper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
6.5
CVSS Score
6.5
CVSS Score
medium
Severity
3.1.25
Patched in
908d
Time to patch
Description
Authenticated Directory Traversal in WordPress Download Manager <= 3.1.24 allows authenticated (Contributor+) users to obtain sensitive configuration file information, as well as allowing Author+ users to perform XSS attacks, by setting Download template to a file containing configuration information or an uploaded JavaScript with an image extension This issue affects: WordPress Download Manager version 3.1.24 and prior versions.
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NAttack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
High
Confidentiality
None
Integrity
None
Availability
Technical Details
Affected versions
<=3.1.24PublishedJuly 29, 2021
Last updatedJanuary 22, 2024
Affected plugindownload-manager
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.