CVE-2022-4476

The Download Manager WordPress plugin before 3.2.62 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks against logged-in admins.
Configurations

Configuration 1 (hide)

cpe:2.3:a:w3eden:download_manager:*:*:*:*:*:wordpress:*:*

History

21 Mar 2025, 16:07

Type Values Removed Values Added
CPE cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:*:*:*:*:*:wordpress:*:* cpe:2.3:a:w3eden:download_manager:*:*:*:*:*:wordpress:*:*
First Time W3eden download Manager
W3eden

21 Nov 2024, 07:35

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/856cac0f-2526-4978-acad-d6d82a0bec45 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/856cac0f-2526-4978-acad-d6d82a0bec45 - Exploit, Third Party Advisory

07 Nov 2023, 03:57

Type Values Removed Values Added
CWE CWE-79

Information

Published : 2023-01-16 16:15

Updated : 2025-04-04 18:15


NVD link : CVE-2022-4476

Mitre link : CVE-2022-4476

CVE.ORG link : CVE-2022-4476


JSON object : View

Products Affected

w3eden

  • download_manager
CWE

No CWE.