Impact
The vulnerability allows an authenticated user with Author or higher privileges to upload an SVG file that contains malicious scripts. Because the Download Manager plugin fails to sanitize or escape the SVG content, the scripts are stored and executed whenever the file is rendered, resulting in arbitrary client‑side code execution.
Affected Systems
The WordPress plugin Download Manager, developed by codename065, is affected in all releases up to and including version 3.3.12.
Risk and Exploitability
The CVSS score of 5.4 indicates moderate severity, while the EPSS score of less than 1% suggests a very low likelihood of exploitation. The vulnerability is not listed in CISA KEV. Exploitation requires the attacker to authenticate with Author‑level or higher access, upload a crafted SVG file, and rely on the script executing in other users’ browsers when they open the file via the plugin’s file upload interface.
OpenCVE Enrichment
EUVD