Page 3 of 24 results (0.005 seconds)

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 2

The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `file[files][]` parameter in versions up to, and including, 3.2.46 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor level permissions and above to inject arbitrary web scripts on the file's page that will execute whenever an administrator accesses the editor area for the injected file page. El plugin Download Manager para WordPress es vulnerable a un ataque de tipo Cross-Site Scripting Almacenado por medio del parámetro "file[files][]" en versiones hasta 3.2.46 incluyéndola, debido a un insuficiente saneo de la entrada y escape de la salida. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en la página del archivo que serán ejecutados siempre que un administrador acceda al área del editor para la página del archivo inyectado WordPress Download Manager plugin versions 3.2.43 and below suffer from a cross site scripting vulnerability. • https://medium.com/%40andreabocchetti88/download-manager-3-2-43-contributor-cross-site-scripting-fa4970fba45c https://packetstormsecurity.com/files/167573 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2750339%40download-manager&new=2750339%40download-manager&sfp_email=&sfph_mail= https://www.wordfence.com/threat-intel/vulnerabilities/id/b399929a-db33-419f-9218-b86ee88a9f1a?source=cve https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2101 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

The Download Manager Plugin for WordPress is vulnerable to reflected Cross-Site Scripting in versions up to, and including 3.2.42. This is due to insufficient input sanitization and output escaping on the 'frameid' parameter found in the ~/src/Package/views/shortcode-iframe.php file. El plugin Download Manager para WordPress es vulnerable a un ataque de tipo Cross-Site Scripting reflejado en versiones hasta la 3.2.42 incluyéndola. Esto es debido a un saneo insuficiente de la entrada y escape de la salida en el parámetro "frameid" encontrado en el archivo ~/src/Package/views/shortcode-iframe.php WordPress Download Manager versions 3.2.42 and below suffer from a cross site scripting vulnerability. • https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2736071%40download-manager&new=2736071%40download-manager&sfp_email=&sfph_mail= https://wordpress.org/plugins/download-manager/#developers https://www.wordfence.com/blog/2022/06/security-vulnerability-download-manager-plugin https://www.wordfence.com/threat-intel/vulnerabilities/id/79fcf18e-39f7-42f2-90e4-3a5bac3382e0?source=cve https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1985 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

The Download Manager WordPress plugin before 3.2.34 uses the uniqid php function to generate the master key for a download, allowing an attacker to brute force the key with reasonable resources giving direct download access regardless of role based restrictions or password protections set for the download. El plugin Download Manager de WordPress versiones anteriores a 3.2.39, usa la función php uniqid para generar la clave maestra para una descarga, permitiendo a un atacante forzar la clave con recursos razonables dando acceso directo a la descarga independientemente de las restricciones basadas en el rol o las protecciones de contraseña establecidas para la descarga The Download Manager WordPress plugin before 3.2.39 uses the uniqid php function to generate the master key for a download, allowing an attacker to brute force the key with reasonable resources giving direct download access regardless of role based restrictions or password protections set for the download. • https://wpscan.com/vulnerability/7f0742ad-6fd7-4258-9e44-d42e138789bb • CWE-326: Inadequate Encryption Strength CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

The Download Manager WordPress plugin before 3.2.35 does not have any authorisation checks in some of the REST API endpoints, allowing unauthenticated attackers to call them, which could lead to sensitive information disclosure, such as posts passwords (fixed in 3.2.24) and files Master Keys (fixed in 3.2.25). El plugin Download Manager de WordPress versiones anteriores a 3.2.35, no presenta comprobaciones de autorización en algunos de los endpoints de la API REST, permitiendo a atacantes no autenticados llamarlos, lo que podría conllevar a una divulgación de información confidencial, como las contraseñas de las entradas (corregido en versión 3.2.24) y las claves maestras de los archivos (corregido en versión 3.2.25) • https://wpscan.com/vulnerability/d7ceafae-65ec-4e05-9ed1-59470771bf07 • CWE-284: Improper Access Control CWE-862: Missing Authorization •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

The WordPress Download Manager WordPress plugin before 3.2.22 does not sanitise and escape Template data before outputting it in various pages (such as admin dashboard and frontend). Due to the lack of authorisation and CSRF checks in the wpdm_save_template AJAX action, any authenticated users such as subscriber is able to call it and perform Cross-Site Scripting attacks El plugin Download Manager de WordPress versiones anteriores a 3.2.22, no sanea y escapa de los datos de la plantilla antes de mostrarlos en varias páginas (como el panel de control del administrador y el frontend). Debido a una falta de comprobaciones de autorización y CSRF en la acción AJAX wpdm_save_template, cualquier usuario autenticado, como el suscriptor, puede llamarla y llevar a cabo ataques de tipo Cross-Site Scripting • https://wpscan.com/vulnerability/01144c50-54ca-44d9-9ce8-bf4f659114ee • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •