6.8

CVE-2021-31567

Download Monitor <= 4.4.6 - Authenticated (Admin+) Arbitrary File Download

Authenticated (admin+) Arbitrary File Download vulnerability discovered in Download Monitor WordPress plugin (versions <= 4.4.6). The plugin allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the &downloadable_file_urls[0] parameter data. It's also possible to escape from the web server home directory and download any file within the OS.
Mögliche Gegenmaßnahme
Download Monitor: Update to version 4.4.7, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Download Monitor
Version * - 4.4.6
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
WpchillDownload Monitor SwPlatformwordpress Version <= 4.4.6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.02% 0.766
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.8 2.3 4
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
nvd@nist.gov 6.8 8 6.9
AV:N/AC:L/Au:S/C:C/I:N/A:N
audit@patchstack.com 6.8 2.3 4
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.