Vulnerabilities > W3Eden > Download Manager > 3.2.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-04-11 | CVE-2022-0828 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in W3Eden Download Manager The Download Manager WordPress plugin before 3.2.34 uses the uniqid php function to generate the master key for a download, allowing an attacker to brute force the key with reasonable resources giving direct download access regardless of role based restrictions or password protections set for the download. | 7.5 |
2022-03-07 | CVE-2021-25087 | Missing Authorization vulnerability in W3Eden Download Manager The Download Manager WordPress plugin before 3.2.35 does not have any authorisation checks in some of the REST API endpoints, allowing unauthenticated attackers to call them, which could lead to sensitive information disclosure, such as posts passwords (fixed in 3.2.24) and files Master Keys (fixed in 3.2.25). | 7.5 |
2021-12-27 | CVE-2021-24969 | Cross-site Scripting vulnerability in W3Eden Download Manager The WordPress Download Manager WordPress plugin before 3.2.22 does not sanitise and escape Template data before outputting it in various pages (such as admin dashboard and frontend). | 5.4 |
2021-11-01 | CVE-2021-24773 | Cross-site Scripting vulnerability in W3Eden Download Manager The WordPress Download Manager WordPress plugin before 3.2.16 does not escape some of the Download settings when outputting them, allowing high privilege users to perform XSS attacks even when the unfiltered_html capability is disallowed | 4.8 |