Vulnerability Description
The WordPress Download Manager WordPress plugin before 3.2.22 does not sanitise and escape Template data before outputting it in various pages (such as admin dashboard and frontend). Due to the lack of authorisation and CSRF checks in the wpdm_save_template AJAX action, any authenticated users such as subscriber is able to call it and perform Cross-Site Scripting attacks
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| W3Eden | Download Manager | < 3.2.22 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/01144c50-54ca-44d9-9ce8-bf4f659114eeExploitThird Party Advisory
- https://wpscan.com/vulnerability/01144c50-54ca-44d9-9ce8-bf4f659114eeExploitThird Party Advisory
FAQ
What is CVE-2021-24969?
CVE-2021-24969 is a vulnerability with a CVSS score of 5.4 (MEDIUM). The WordPress Download Manager WordPress plugin before 3.2.22 does not sanitise and escape Template data before outputting it in various pages (such as admin dashboard and frontend). Due to the lack o...
How severe is CVE-2021-24969?
CVE-2021-24969 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-24969?
Check the references section above for vendor advisories and patch information. Affected products include: W3Eden Download Manager.