The Simple Download Monitor plugin before 3.5.4 for WordPress has XSS via the sdm_upload (aka Downloadable File) parameter in an edit action to wp-admin/post.php.
References
Link | Resource |
---|---|
https://github.com/Arsenal21/simple-download-monitor/commit/8ab8b9166bc87feba26a1573cf595af48eff7805 | Patch Third Party Advisory |
https://github.com/Arsenal21/simple-download-monitor/issues/27 | Exploit Third Party Advisory |
https://github.com/d4wner/Vulnerabilities-Report/blob/master/simple-download-monitor.md | Exploit Third Party Advisory |
https://wordpress.org/support/topic/stored-xss-bug-at-the-latest-version-of-simple-download-monitor/ | Broken Link |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2018-01-04 18:29
Updated : 2024-02-28 16:04
NVD link : CVE-2018-5213
Mitre link : CVE-2018-5213
CVE.ORG link : CVE-2018-5213
JSON object : View
Products Affected
simple_download_monitor_project
- simple_download_monitor
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')