The Download Manager Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via wpdm_user_dashboard, wpdm_package, wpdm_packages, wpdm_search_result, and wpdm_tag shortcodes in all versions up to, and including, 3.2.92 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Link Providers
https://plugins.trac.wordpress.org/changeset/3096450/#file24 cve-icon cve-icon cve-icon
https://plugins.trac.wordpress.org/log/download-manager/trunk/src/Package/Shortcodes.php?rev=3052986#L255 cve-icon cve-icon cve-icon
https://plugins.trac.wordpress.org/log/download-manager/trunk/src/Package/Shortcodes.php?rev=3052986#L315 cve-icon cve-icon cve-icon
https://plugins.trac.wordpress.org/log/download-manager/trunk/src/Package/Shortcodes.php?rev=3052986#L337 cve-icon cve-icon cve-icon
https://plugins.trac.wordpress.org/log/download-manager/trunk/src/Package/Shortcodes.php?rev=3052986#L63 cve-icon cve-icon cve-icon
https://plugins.trac.wordpress.org/log/download-manager/trunk/src/Package/views/link-templates/link-template-bsthumnail.php?rev=2558306#L5 cve-icon cve-icon cve-icon
https://plugins.trac.wordpress.org/log/download-manager/trunk/src/User/Dashboard.php?rev=2799791#L32 cve-icon cve-icon cve-icon
https://plugins.trac.wordpress.org/log/download-manager/trunk/src/User/Dashboard.php?rev=2799791#L71 cve-icon cve-icon cve-icon
https://plugins.trac.wordpress.org/log/download-manager/trunk/src/User/views/dashboard/profile.php?rev=2558306#L79 cve-icon cve-icon cve-icon
https://plugins.trac.wordpress.org/log/download-manager/trunk/src/wpdm-functions.php?rev=3052986#L216 cve-icon cve-icon cve-icon
https://plugins.trac.wordpress.org/log/download-manager/trunk/src/wpdm-functions.php?rev=3052986#L261 cve-icon cve-icon cve-icon
https://wordpress.org/plugins/download-manager/ cve-icon cve-icon cve-icon
https://www.wordfence.com/threat-intel/vulnerabilities/id/6e363a62-8d31-4140-878b-5034d6c7b6a1?source=cve cve-icon cve-icon cve-icon
https://www.wpdownloadmanager.com/doc/short-codes/wpdm_package-single-package-embed-short-code/ cve-icon cve-icon cve-icon
https://www.wpdownloadmanager.com/doc/short-codes/wpdm_packages-wp_query-in-a-shortcode-for-download-manager-packages/ cve-icon cve-icon cve-icon
https://www.wpdownloadmanager.com/doc/short-codes/wpdm_search_result-shows-search-form/ cve-icon cve-icon cve-icon
https://www.wpdownloadmanager.com/doc/short-codes/wpdm_tag-query-all-downloads-from-specified-tags/ cve-icon cve-icon cve-icon
https://www.wpdownloadmanager.com/doc/short-codes/wpdm_user_dashboard-user-dashboard-short-code/ cve-icon cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-06-12T08:33:18.925Z

Updated: 2024-08-01T21:11:12.410Z

Reserved: 2024-05-23T12:32:56.390Z

Link: CVE-2024-5266

cve-icon Vulnrichment

Updated: 2024-08-01T21:11:12.410Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-12T09:15:21.317

Modified: 2024-07-23T20:17:55.073

Link: CVE-2024-5266

cve-icon Redhat

No data.