Vulnerability Description
Server-side request forgery in the WP-DownloadManager plugin 1.68.4 for WordPress lets an attacker send crafted requests from the back-end server of a vulnerable web application via the file_remote parameter to download-add.php. It can help identify open ports, local network hosts and execute command on services
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wp-Downloadmanager Project | Wp-Downloadmanager | 1.68.4 |
Related Weaknesses (CWE)
References
- https://github.com/secwx/research/blob/main/cve/CVE-2020-24141.mdThird Party Advisory
- https://github.com/secwx/research/blob/main/cve/CVE-2020-24141.mdThird Party Advisory
FAQ
What is CVE-2020-24141?
CVE-2020-24141 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Server-side request forgery in the WP-DownloadManager plugin 1.68.4 for WordPress lets an attacker send crafted requests from the back-end server of a vulnerable web application via the file_remote pa...
How severe is CVE-2020-24141?
CVE-2020-24141 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-24141?
Check the references section above for vendor advisories and patch information. Affected products include: Wp-Downloadmanager Project Wp-Downloadmanager.