First published: Wed Jul 07 2021(Updated: )
Server-side request forgery in the WP-DownloadManager plugin 1.68.4 for WordPress lets an attacker send crafted requests from the back-end server of a vulnerable web application via the file_remote parameter to download-add.php. It can help identify open ports, local network hosts and execute command on services
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Download Manager Pro | =1.68.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24141 is considered to be a medium severity vulnerability due to its potential for server-side request forgery.
To mitigate CVE-2020-24141, update the WP-DownloadManager plugin to the latest version that addresses this vulnerability.
CVE-2020-24141 can facilitate attacks that allow an attacker to send crafted requests to local network resources and potentially execute commands.
CVE-2020-24141 specifically affects WP-DownloadManager version 1.68.4 for WordPress.
CVE-2020-24141 can be exploited in the back-end server of a vulnerable web application through the file_remote parameter.