WordPress.Download.Manager.Plugin.Package.Settings.Stored.XSS
Description
This indicates an attack attempt to exploit a Cross-Site Scripting Vulnerability in WordPress Project Download Manager Plugin for WordPress.
The vulnerability is due to insufficient sanitization of user-supplied data in Package Settings. A remote, authenticated attacker can exploit this vulnerability by sending a specially crafted request to the target server. Successful exploitation could result in arbitrary script code being executed in the security context of the browser.
Affected Products
WordPress Project Download Manager Plugin for WordPress prior to 3.2.16
Impact
System Compromise: Remote attackers can execute arbitrary script code in the context of the affected application.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://downloads.wordpress.org/plugin/download-manager.3.2.16.zip
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2021-12-28 | 19.226 | Sig Added |
2021-12-20 | 19.221 | Default_action:pass:drop |
2021-12-08 | 19.212 |