First published: Mon Nov 01 2021(Updated: )
The WordPress Download Manager WordPress plugin before 3.2.16 does not escape some of the Download settings when outputting them, allowing high privilege users to perform XSS attacks even when the unfiltered_html capability is disallowed
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Download Manager | <3.2.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-24773 has been classified as a high severity vulnerability due to its potential for XSS attacks.
To mitigate CVE-2021-24773, update the WordPress Download Manager plugin to version 3.2.16 or later.
CVE-2021-24773 affects users of the WordPress Download Manager plugin prior to version 3.2.16.
CVE-2021-24773 allows high privilege users to perform cross-site scripting (XSS) attacks.
CVE-2021-24773 can be exploited regardless of whether the unfiltered_html capability is disallowed for users.