Server-Side Request Forgery Vulnerability in WP-DownloadManager Plugin for WordPress
CVE-2020-24141

5.3MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
7 July 2021

Summary

The WP-DownloadManager plugin version 1.68.4 for WordPress contains a server-side request forgery vulnerability that allows an attacker to send maliciously crafted requests. This can be executed through the 'file_remote' parameter in the download-add.php file, which may lead the attacker to discover open ports on the server, probe local network hosts, and potentially execute commands on vulnerable services. This security flaw highlights the importance of maintaining updated and secure configurations to prevent unauthorized access.

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.