Authenticated Directory Traversal in WordPress Download Manager <= 3.1.24 allows authenticated (Contributor+) users to obtain sensitive configuration file information, as well as allowing Author+ users to perform XSS attacks, by setting Download template to a file containing configuration information or an uploaded JavaScript with an image extension This issue affects: WordPress Download Manager version 3.1.24 and prior versions.
History

Fri, 21 Mar 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared W3eden
W3eden download Manager
CPEs cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:*:*:*:*:*:wordpress:*:* cpe:2.3:a:w3eden:download_manager:*:*:*:*:*:wordpress:*:*
Vendors & Products Wpdownloadmanager
Wpdownloadmanager wordpress Download Manager
W3eden
W3eden download Manager

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-04T00:19:47.463Z

Reserved: 2021-06-10T00:00:00

Link: CVE-2021-34638

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-08-05T21:15:12.307

Modified: 2025-03-21T16:07:09.227

Link: CVE-2021-34638

cve-icon Redhat

No data.