The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpdm_modal_login_form' shortcode in all versions up to, and including, 3.2.93 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/3096459/ | Patch |
https://www.wordfence.com/threat-intel/vulnerabilities/id/b478d88d-1423-4a33-b8ef-08b9e66a5d98?source=cve | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-06-05T11:01:58.831Z
Updated: 2024-06-06T14:45:54.238Z
Reserved: 2024-04-19T15:11:28.420Z
Link: CVE-2024-4001
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-06-05T11:15:08.490
Modified: 2024-06-11T17:27:53.637
Link: CVE-2024-4001
JSON object: View
Redhat Information
No data.
CWE