Description
The Download Manager WordPress plugin before 3.2.34 does not sanitise and escape the package_ids parameter before using it in a SQL statement, leading to a SQL injection, which can also be exploited to cause a Reflected Cross-Site Scripting issue
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-11981 | The Download Manager WordPress plugin before 3.2.34 does not sanitise and escape the package_ids parameter before using it in a SQL statement, leading to a SQL injection, which can also be exploited to cause a Reflected Cross-Site Scripting issue |
References
History
Fri, 21 Mar 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
W3eden
W3eden download Manager |
|
| CPEs | cpe:2.3:a:w3eden:download_manager:*:*:*:*:free:wordpress:*:* | |
| Vendors & Products |
Wpdownloadmanager
Wpdownloadmanager download Manager |
W3eden
W3eden download Manager |
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-03T19:56:09.477Z
Reserved: 2021-01-14T00:00:00.000Z
Link: CVE-2021-25069
No data.
Status : Analyzed
Published: 2022-02-21T11:15:08.650
Modified: 2025-03-21T19:19:49.427
Link: CVE-2021-25069
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD