Unauthorized Access of Data in Download Plugin for WordPress
CVE-2024-9829
6.5MEDIUM
Key Information
- Vendor
- Metagauss
- Status
- Download Plugin
- Vendor
- CVE Published:
- 23 October 2024
Summary
The Download Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability checks on the 'dpwap_handle_download_user' and 'dpwap_handle_download_comment' functions in all versions up to, and including, 2.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download any comment, and download metadata for any user including user PII and sensitive information including username, email, hashed passwords and application passwords, session token information and more depending on set up and additional plugins installed.
Affected Version(s)
Download Plugin <= 2.2.0
Refferences
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
Matthew Rollings
Brian Sans-Souci