The WordPress Download Manager WordPress plugin before 3.2.16 does not escape some of the Download settings when outputting them, allowing high privilege users to perform XSS attacks even when the unfiltered_html capability is disallowed
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/aab2ddbb-7675-40fc-90ee-f5bfa8a5b995 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/aab2ddbb-7675-40fc-90ee-f5bfa8a5b995 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/aab2ddbb-7675-40fc-90ee-f5bfa8a5b995 - Exploit, Third Party Advisory |
Information
Published : 2021-11-01 09:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24773
Mitre link : CVE-2021-24773
CVE.ORG link : CVE-2021-24773
JSON object : View
Products Affected
wpdownloadmanager
- wordpress_download_manager
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')