Description
Authenticated File Upload in WordPress Download Manager <= 3.1.24 allows authenticated (Author+) users to upload files with a double extension, e.g. "payload.php.png" which is executable in some configurations. This issue affects: WordPress Download Manager version 3.1.24 and prior versions.
Published: 2021-08-05
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-21289 Authenticated File Upload in WordPress Download Manager <= 3.1.24 allows authenticated (Author+) users to upload files with a double extension, e.g. "payload.php.png" which is executable in some configurations. This issue affects: WordPress Download Manager version 3.1.24 and prior versions.
History

Fri, 21 Mar 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared W3eden
W3eden download Manager
CPEs cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:*:*:*:*:*:wordpress:*:* cpe:2.3:a:w3eden:download_manager:*:*:*:*:*:wordpress:*:*
Vendors & Products Wpdownloadmanager
Wpdownloadmanager wordpress Download Manager
W3eden
W3eden download Manager

Subscriptions

W3eden Download Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-04T00:19:47.285Z

Reserved: 2021-06-10T00:00:00.000Z

Link: CVE-2021-34639

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-08-05T21:15:12.387

Modified: 2025-03-21T16:07:09.227

Link: CVE-2021-34639

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses