First published: Fri Jun 09 2023(Updated: )
The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpdm_members', 'wpdm_login_form', 'wpdm_reg_form' shortcodes in versions up to, and including, 3.2.70 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Download Manager | <3.2.71 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2305 is considered a high-severity vulnerability due to its potential for Stored Cross-Site Scripting attacks.
To fix CVE-2023-2305, you should update the WordPress Download Manager plugin to version 3.2.71 or later.
CVE-2023-2305 affects the WordPress Download Manager plugin versions up to and including 3.2.70.
The implications of CVE-2023-2305 include potential unauthorized script execution on affected WordPress sites.
CVE-2023-2305 involves the 'wpdm_members', 'wpdm_login_form', and 'wpdm_reg_form' shortcodes within the plugin.