CVE-2021-24773

The WordPress Download Manager WordPress plugin before 3.2.16 does not escape some of the Download settings when outputting them, allowing high privilege users to perform XSS attacks even when the unfiltered_html capability is disallowed
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:53

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/aab2ddbb-7675-40fc-90ee-f5bfa8a5b995 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/aab2ddbb-7675-40fc-90ee-f5bfa8a5b995 - Exploit, Third Party Advisory

02 Nov 2021, 17:16

Type Values Removed Values Added
CPE cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 3.5
v3 : 4.8
References (MISC) https://wpscan.com/vulnerability/aab2ddbb-7675-40fc-90ee-f5bfa8a5b995 - (MISC) https://wpscan.com/vulnerability/aab2ddbb-7675-40fc-90ee-f5bfa8a5b995 - Exploit, Third Party Advisory

01 Nov 2021, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-11-01 09:15

Updated : 2024-11-21 05:53


NVD link : CVE-2021-24773

Mitre link : CVE-2021-24773

CVE.ORG link : CVE-2021-24773


JSON object : View

Products Affected

wpdownloadmanager

  • wordpress_download_manager
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')