The WordPress Download Manager WordPress plugin before 3.2.16 does not escape some of the Download settings when outputting them, allowing high privilege users to perform XSS attacks even when the unfiltered_html capability is disallowed
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/aab2ddbb-7675-40fc-90ee-f5bfa8a5b995 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/aab2ddbb-7675-40fc-90ee-f5bfa8a5b995 | Exploit Third Party Advisory |
Configurations
History
21 Mar 2025, 16:07
Type | Values Removed | Values Added |
---|---|---|
First Time |
W3eden download Manager
W3eden |
|
CPE | cpe:2.3:a:w3eden:download_manager:*:*:*:*:*:wordpress:*:* |
Information
Published : 2021-11-01 09:15
Updated : 2025-03-21 16:07
NVD link : CVE-2021-24773
Mitre link : CVE-2021-24773
CVE.ORG link : CVE-2021-24773
JSON object : View
Products Affected
w3eden
- download_manager
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')