First published: Wed Oct 16 2024(Updated: )
The Download Monitor plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several REST-API routes related to reporting in versions up to, and including, 4.7.51. This makes it possible for unauthenticated attackers to view user data and other sensitive information intended for administrators.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPChill Download Monitor | <=4.7.51 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4972 is assigned a moderate severity level due to the potential for unauthorized access to user data.
To fix CVE-2022-4972, update the Download Monitor plugin to version 4.7.52 or later.
Any user running version 4.7.51 or earlier of the Download Monitor plugin for WordPress is affected by CVE-2022-4972.
CVE-2022-4972 allows unauthenticated attackers to bypass authorization and access sensitive user data.
A temporary workaround for CVE-2022-4972 is to disable the Download Monitor plugin until an update is applied.