First published: Fri Jan 14 2022(Updated: )
Authenticated Reflected Cross-Site Scripting (XSS) vulnerability discovered in WordPress plugin Download Monitor (versions <= 4.4.6).
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPChill Download Monitor | <=4.4.6 |
Update to 4.4.7 or higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-36920 is medium with a severity value of 5.4.
The WordPress plugin Download Monitor (versions <= 4.4.6) is affected by CVE-2021-36920.
CVE-2021-36920 is an Authenticated Reflected Cross-Site Scripting (XSS) vulnerability.
To fix CVE-2021-36920, upgrade the affected version of the Download Monitor plugin to a version above 4.4.6.
You can find more information about CVE-2021-36920 in the references: [Reference 1](https://patchstack.com/database/vulnerability/download-monitor/wordpress-download-monitor-plugin-4-4-6-authenticated-reflected-cross-site-scripting-xss-vulnerability), [Reference 2](https://wordpress.org/plugins/download-monitor/#developers).