HTTP:WordPress Download Monitor Plugin Stored Cross-Site Scripting

This signature detects attempts to exploit a known cross-site scripting vulnerability against WordPress Download Monitor Plugin. It is due to insufficient validation of user-supplied input. Attackers can steal cookie-based authentication credentials and launch other attacks.

Extended Description

Authenticated (admin+) Persistent Cross-Site Scripting (XSS) vulnerability discovered in Download Monitor WordPress plugin (versions <= 4.4.6) Vulnerable parameters: &post_title, &downloadable_file_version[0].

Affected Products

Wpchill download_monitor

Short Name
HTTP:XSS:WRDPRS-DWNLD-MON-PLGIN
Severity
Warning
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2021-23174 Cross-Site Download Monitor Plugin Scripting Stored WordPress
Release Date
03/03/2022
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3741
False Positive
Unknown
Vendors

Wpchill

CVSS Score

3.5

Found a potential security threat?