CVE-2023-1524

The Download Manager WordPress plugin before 3.2.71 does not adequately validate passwords for password-protected files. Upon validation, a master key is generated and exposed to the user, which may be used to download any password-protected file on the server, allowing a user to download any file with the knowledge of any one file's password.
Configurations

Configuration 1 (hide)

cpe:2.3:a:w3eden:download_manager:*:*:*:*:free:wordpress:*:*

History

21 Mar 2025, 19:19

Type Values Removed Values Added
First Time W3eden download Manager
W3eden
CPE cpe:2.3:a:wpdownloadmanager:download_manager:*:*:*:*:*:wordpress:*:* cpe:2.3:a:w3eden:download_manager:*:*:*:*:free:wordpress:*:*
References () https://wpscan.com/vulnerability/3802d15d-9bfd-4762-ab8a-04475451868e - Exploit () https://wpscan.com/vulnerability/3802d15d-9bfd-4762-ab8a-04475451868e - Exploit, Third Party Advisory
CWE NVD-CWE-noinfo

Information

Published : 2023-05-30 08:15

Updated : 2025-03-21 19:19


NVD link : CVE-2023-1524

Mitre link : CVE-2023-1524

CVE.ORG link : CVE-2023-1524


JSON object : View

Products Affected

w3eden

  • download_manager