The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpdm_all_packages' shortcode in all versions up to, and including, 3.2.97 due to insufficient input sanitization and output escaping on the 'cols' parameter. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Configurations
History
21 Mar 2025, 16:35
Type | Values Removed | Values Added |
---|---|---|
First Time |
W3eden download Manager
W3eden |
|
CPE | cpe:2.3:a:w3eden:download_manager:*:*:*:*:free:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/browser/download-manager/trunk/src/Package/views/all-packages-shortcode.php?rev=3097323#L10 - Product | |
References | () https://plugins.trac.wordpress.org/browser/download-manager/trunk/src/Package/views/all-packages-shortcode.php?rev=3097323#L302 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3126662/ - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/7c67d2f8-d918-42ef-a301-27eed7fa41b2?source=cve - Third Party Advisory |
Information
Published : 2024-07-31 13:15
Updated : 2025-03-21 16:35
NVD link : CVE-2024-6208
Mitre link : CVE-2024-6208
CVE.ORG link : CVE-2024-6208
JSON object : View
Products Affected
w3eden
- download_manager
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')