The Download Manager WordPress plugin before 3.2.71 does not adequately validate passwords for password-protected files. Upon validation, a master key is generated and exposed to the user, which may be used to download any password-protected file on the server, allowing a user to download any file with the knowledge of any one file's password.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/3802d15d-9bfd-4762-ab8a-04475451868e | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/3802d15d-9bfd-4762-ab8a-04475451868e | Exploit Third Party Advisory |
Configurations
History
21 Mar 2025, 19:19
Type | Values Removed | Values Added |
---|---|---|
First Time |
W3eden download Manager
W3eden |
|
CPE | cpe:2.3:a:w3eden:download_manager:*:*:*:*:free:wordpress:*:* | |
References | () https://wpscan.com/vulnerability/3802d15d-9bfd-4762-ab8a-04475451868e - Exploit, Third Party Advisory | |
CWE | NVD-CWE-noinfo |
Information
Published : 2023-05-30 08:15
Updated : 2025-03-21 19:19
NVD link : CVE-2023-1524
Mitre link : CVE-2023-1524
CVE.ORG link : CVE-2023-1524
JSON object : View
Products Affected
w3eden
- download_manager
CWE