The Download Manager Plugin for WordPress is vulnerable to reflected Cross-Site Scripting in versions up to, and including 3.2.42. This is due to insufficient input sanitization and output escaping on the 'frameid' parameter found in the ~/src/Package/views/shortcode-iframe.php file.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2736071%40download-manager&new=2736071%40download-manager&sfp_email=&sfph_mail= - Patch, Third Party Advisory | |
References | () https://wordpress.org/plugins/download-manager/#developers - | |
References | () https://www.wordfence.com/blog/2022/06/security-vulnerability-download-manager-plugin/ - Exploit, Third Party Advisory | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/79fcf18e-39f7-42f2-90e4-3a5bac3382e0?source=cve - | |
References | () https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1985 - Third Party Advisory |
11 Jan 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
References |
|
Information
Published : 2022-06-13 13:15
Updated : 2024-11-21 06:41
NVD link : CVE-2022-1985
Mitre link : CVE-2022-1985
CVE.ORG link : CVE-2022-1985
JSON object : View
Products Affected
wpdownloadmanager
- wordpress_download_manager
CWE
No CWE.