Description
Authenticated Directory Traversal in WordPress Download Manager <= 3.1.24 allows authenticated (Contributor+) users to obtain sensitive configuration file information, as well as allowing Author+ users to perform XSS attacks, by setting Download template to a file containing configuration information or an uploaded JavaScript with an image extension This issue affects: WordPress Download Manager version 3.1.24 and prior versions.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21288 | Authenticated Directory Traversal in WordPress Download Manager <= 3.1.24 allows authenticated (Contributor+) users to obtain sensitive configuration file information, as well as allowing Author+ users to perform XSS attacks, by setting Download template to a file containing configuration information or an uploaded JavaScript with an image extension This issue affects: WordPress Download Manager version 3.1.24 and prior versions. |
References
History
Fri, 21 Mar 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
W3eden
W3eden download Manager |
|
| CPEs | cpe:2.3:a:w3eden:download_manager:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Wpdownloadmanager
Wpdownloadmanager wordpress Download Manager |
W3eden
W3eden download Manager |
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-04T00:19:47.463Z
Reserved: 2021-06-10T00:00:00.000Z
Link: CVE-2021-34638
No data.
Status : Modified
Published: 2021-08-05T21:15:12.307
Modified: 2025-03-21T16:07:09.227
Link: CVE-2021-34638
No data.
OpenCVE Enrichment
No data.
EUVD