HTTP: WordPress Download Manager Plugin Package Settings Stored Cross-Site Scripting

This signature detects attempts to exploit a known cross-site scripting vulnerability against WordPress Download Manager. It is due to insufficient validation of user-supplied input. Attackers can steal cookie-based authentication credentials and launch other attacks.

Extended Description

The WordPress Download Manager WordPress plugin before 3.2.16 does not escape some of the Download settings when outputting them, allowing high privilege users to perform XSS attacks even when the unfiltered_html capability is disallowed

Affected Products

W3eden download_manager

References

CVE: CVE-2021-24773

Short Name
HTTP:XSS:WP-DL-MNGR-PLUGIN
Severity
Warning
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2021-24773 Cross-Site Download Manager Package Plugin Scripting Settings Stored WordPress
Release Date
11/25/2021
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3793
False Positive
Unknown
Vendors

W3eden

CVSS Score

3.5

Found a potential security threat?