First published: Mon Nov 08 2021(Updated: )
The Simple Download Monitor WordPress plugin before 3.9.5 does not escape the "File Thumbnail" post meta before outputting it in some pages, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks. Given the that XSS is triggered even when the Download is in a review state, contributor could make JavaScript code execute in a context of a reviewer such as admin and make them create a rogue admin account, or install a malicious plugin
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tipsandtricks-hq Simple Download Monitor | <3.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-24693.
CVE-2021-24693 has a severity of critical (9).
The affected software for CVE-2021-24693 is the Simple Download Monitor WordPress plugin version up to and excluding 3.9.5.
CVE-2021-24693 is classified under CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
This vulnerability can be exploited by users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks.