First published: Mon Apr 11 2022(Updated: )
The Download Manager WordPress plugin before 3.2.34 uses the uniqid php function to generate the master key for a download, allowing an attacker to brute force the key with reasonable resources giving direct download access regardless of role based restrictions or password protections set for the download.
Credit: contact@wpscan.com contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Download Manager | <3.2.34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0828 has a medium severity rating due to its potential to allow unauthorized access to downloads.
To fix CVE-2022-0828, update the WordPress Download Manager plugin to version 3.2.34 or later.
CVE-2022-0828 affects the WordPress Download Manager plugin versions prior to 3.2.34.
CVE-2022-0828 exploits the use of the uniqid PHP function to generate insecure master keys for downloads.
Yes, CVE-2022-0828 can circumvent role-based access restrictions and password protection for downloads.