The Download Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the dpwap_plugin_locInstall function in all versions up to, and including, 2.2.8. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
References
Configurations
History
09 Jul 2025, 17:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:metagauss:download_plugin:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/browser/download-plugin/tags/2.2.8/app/Plugins/Dpwapuploader.php#L300 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/37734c25-cce3-41fb-babf-714ba7a4bced?source=cve - Third Party Advisory | |
First Time |
Metagauss
Metagauss download Plugin |
08 Jul 2025, 16:18
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Jul 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-04 03:15
Updated : 2025-07-09 17:50
NVD link : CVE-2025-6586
Mitre link : CVE-2025-6586
CVE.ORG link : CVE-2025-6586
JSON object : View
Products Affected
metagauss
- download_plugin
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type