Page 3 of 23 results (0.028 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

The Download Manager Plugin for WordPress is vulnerable to reflected Cross-Site Scripting in versions up to, and including 3.2.42. This is due to insufficient input sanitization and output escaping on the 'frameid' parameter found in the ~/src/Package/views/shortcode-iframe.php file. El plugin Download Manager para WordPress es vulnerable a un ataque de tipo Cross-Site Scripting reflejado en versiones hasta la 3.2.42 incluyéndola. Esto es debido a un saneo insuficiente de la entrada y escape de la salida en el parámetro "frameid" encontrado en el archivo ~/src/Package/views/shortcode-iframe.php WordPress Download Manager versions 3.2.42 and below suffer from a cross site scripting vulnerability. • https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2736071%40download-manager&new=2736071%40download-manager&sfp_email=&sfph_mail= https://wordpress.org/plugins/download-manager/#developers https://www.wordfence.com/blog/2022/06/security-vulnerability-download-manager-plugin https://www.wordfence.com/threat-intel/vulnerabilities/id/79fcf18e-39f7-42f2-90e4-3a5bac3382e0?source=cve https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1985 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

The Download Manager WordPress plugin before 3.2.34 uses the uniqid php function to generate the master key for a download, allowing an attacker to brute force the key with reasonable resources giving direct download access regardless of role based restrictions or password protections set for the download. El plugin Download Manager de WordPress versiones anteriores a 3.2.39, usa la función php uniqid para generar la clave maestra para una descarga, permitiendo a un atacante forzar la clave con recursos razonables dando acceso directo a la descarga independientemente de las restricciones basadas en el rol o las protecciones de contraseña establecidas para la descarga The Download Manager WordPress plugin before 3.2.39 uses the uniqid php function to generate the master key for a download, allowing an attacker to brute force the key with reasonable resources giving direct download access regardless of role based restrictions or password protections set for the download. • https://wpscan.com/vulnerability/7f0742ad-6fd7-4258-9e44-d42e138789bb • CWE-326: Inadequate Encryption Strength CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

The Download Manager WordPress plugin before 3.2.35 does not have any authorisation checks in some of the REST API endpoints, allowing unauthenticated attackers to call them, which could lead to sensitive information disclosure, such as posts passwords (fixed in 3.2.24) and files Master Keys (fixed in 3.2.25). El plugin Download Manager de WordPress versiones anteriores a 3.2.35, no presenta comprobaciones de autorización en algunos de los endpoints de la API REST, permitiendo a atacantes no autenticados llamarlos, lo que podría conllevar a una divulgación de información confidencial, como las contraseñas de las entradas (corregido en versión 3.2.24) y las claves maestras de los archivos (corregido en versión 3.2.25) • https://wpscan.com/vulnerability/d7ceafae-65ec-4e05-9ed1-59470771bf07 • CWE-284: Improper Access Control CWE-862: Missing Authorization •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

The WordPress Download Manager WordPress plugin before 3.2.22 does not sanitise and escape Template data before outputting it in various pages (such as admin dashboard and frontend). Due to the lack of authorisation and CSRF checks in the wpdm_save_template AJAX action, any authenticated users such as subscriber is able to call it and perform Cross-Site Scripting attacks El plugin Download Manager de WordPress versiones anteriores a 3.2.22, no sanea y escapa de los datos de la plantilla antes de mostrarlos en varias páginas (como el panel de control del administrador y el frontend). Debido a una falta de comprobaciones de autorización y CSRF en la acción AJAX wpdm_save_template, cualquier usuario autenticado, como el suscriptor, puede llamarla y llevar a cabo ataques de tipo Cross-Site Scripting • https://wpscan.com/vulnerability/01144c50-54ca-44d9-9ce8-bf4f659114ee • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

The WordPress Download Manager WordPress plugin before 3.2.16 does not escape some of the Download settings when outputting them, allowing high privilege users to perform XSS attacks even when the unfiltered_html capability is disallowed El plugin Download Manager de WordPress versiones anteriores a 3.2.16 no escapa a algunos de los ajustes de descarga cuando los emite, permitiendo a usuarios con altos privilegios llevar a cabo ataques de tipo XSS incluso cuando la capacidad unfiltered_html no está permitida • https://wpscan.com/vulnerability/aab2ddbb-7675-40fc-90ee-f5bfa8a5b995 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •