The CM Download Manager WordPress plugin before 2.9.1 does not have CSRF checks in some places, which could allow attackers to make logged in admins edit downloads via a CSRF attack
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/469486d4-7677-4d66-83c0-a6b9ac7c503b/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/469486d4-7677-4d66-83c0-a6b9ac7c503b/ | Exploit Third Party Advisory |
Configurations
History
01 Apr 2025, 17:10
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cminds:cm_download_manager:*:*:*:*:*:wordpress:*:* | |
References | () https://wpscan.com/vulnerability/469486d4-7677-4d66-83c0-a6b9ac7c503b/ - Exploit, Third Party Advisory | |
First Time |
Cminds
Cminds cm Download Manager |
|
CWE | CWE-352 |
Information
Published : 2024-03-25 05:15
Updated : 2025-04-01 17:10
NVD link : CVE-2024-1962
Mitre link : CVE-2024-1962
CVE.ORG link : CVE-2024-1962
JSON object : View
Products Affected
cminds
- cm_download_manager
CWE
CWE-352
Cross-Site Request Forgery (CSRF)