Description
Authenticated (admin+) Arbitrary File Download vulnerability discovered in Download Monitor WordPress plugin (versions <= 4.4.6). The plugin allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the &downloadable_file_urls[0] parameter data. It's also possible to escape from the web server home directory and download any file within the OS.
No analysis available yet.
Remediation
Vendor Solution
Update to 4.4.7 or higher version.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-18461 | Authenticated (admin+) Arbitrary File Download vulnerability discovered in Download Monitor WordPress plugin (versions <= 4.4.6). The plugin allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the &downloadable_file_urls[0] parameter data. It's also possible to escape from the web server home directory and download any file within the OS. |
References
History
Thu, 20 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2025-02-20T20:32:09.560Z
Reserved: 2022-01-13T00:00:00.000Z
Link: CVE-2021-31567
Updated: 2024-08-03T23:03:33.608Z
Status : Modified
Published: 2022-01-28T20:15:11.050
Modified: 2025-02-20T21:15:12.453
Link: CVE-2021-31567
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD