6.8
CVE-2021-31567
- EPSS 1.02%
- Veröffentlicht 28.01.2022 20:15:11
- Zuletzt bearbeitet 20.02.2025 21:15:12
- Quelle audit@patchstack.com
- CVE-Watchlists
- Unerledigt
Download Monitor <= 4.4.6 - Authenticated (Admin+) Arbitrary File Download
Authenticated (admin+) Arbitrary File Download vulnerability discovered in Download Monitor WordPress plugin (versions <= 4.4.6). The plugin allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the &downloadable_file_urls[0] parameter data. It's also possible to escape from the web server home directory and download any file within the OS.
Mögliche Gegenmaßnahme
Download Monitor: Update to version 4.4.7, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Download Monitor
Version
* - 4.4.6
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wpchill ≫ Download Monitor SwPlatformwordpress Version <= 4.4.6
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.02% | 0.766 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.8 | 2.3 | 4 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
|
| nvd@nist.gov | 6.8 | 8 | 6.9 |
AV:N/AC:L/Au:S/C:C/I:N/A:N
|
| audit@patchstack.com | 6.8 | 2.3 | 4 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.