First published: Mon Dec 27 2021(Updated: )
The WordPress Download Manager WordPress plugin before 3.2.22 does not sanitise and escape Template data before outputting it in various pages (such as admin dashboard and frontend). Due to the lack of authorisation and CSRF checks in the wpdm_save_template AJAX action, any authenticated users such as subscriber is able to call it and perform Cross-Site Scripting attacks
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Download Manager | <3.2.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-24969 is classified as a medium severity vulnerability affecting the WordPress Download Manager plugin.
To fix CVE-2021-24969, you should update the WordPress Download Manager plugin to version 3.2.22 or later.
The risks associated with CVE-2021-24969 include potential unauthorized access and exploitation due to unvalidated input leading to cross-site scripting attacks.
CVE-2021-24969 affects all versions of the WordPress Download Manager plugin before 3.2.22.
The wpdm_save_template AJAX action is vulnerable in CVE-2021-24969, allowing for unauthorized modifications without proper checks.