Description
Authenticated File Upload in WordPress Download Manager <= 3.1.24 allows authenticated (Author+) users to upload files with a double extension, e.g. "payload.php.png" which is executable in some configurations. This issue affects: WordPress Download Manager version 3.1.24 and prior versions.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21289 | Authenticated File Upload in WordPress Download Manager <= 3.1.24 allows authenticated (Author+) users to upload files with a double extension, e.g. "payload.php.png" which is executable in some configurations. This issue affects: WordPress Download Manager version 3.1.24 and prior versions. |
References
History
Fri, 21 Mar 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
W3eden
W3eden download Manager |
|
| CPEs | cpe:2.3:a:w3eden:download_manager:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Wpdownloadmanager
Wpdownloadmanager wordpress Download Manager |
W3eden
W3eden download Manager |
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-04T00:19:47.285Z
Reserved: 2021-06-10T00:00:00.000Z
Link: CVE-2021-34639
No data.
Status : Modified
Published: 2021-08-05T21:15:12.387
Modified: 2025-03-21T16:07:09.227
Link: CVE-2021-34639
No data.
OpenCVE Enrichment
No data.
EUVD