Severity
8.8HIGHNVD
CNA8.1
EPSS
17.1%
top 4.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 6
Latest updateSep 7

Description

The Download Manager plugin for WordPress is vulnerable to arbitrary file deletion in versions up to, and including 3.2.50. This is due to insufficient file type and path validation on the deleteFiles() function found in the ~/Admin/Menu/Packages.php file that triggers upon download post deletion. This makes it possible for contributor level users and above to supply an arbitrary file path via the 'file[files]' parameter when creating a download post and once the user deletes the post the suppli

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5download-manager/download_manager3.2.503.2.50

Patches

🔴Vulnerability Details

2
GHSA
GHSA-3hhq-xm5h-wcvh: The Download Manager plugin for WordPress is vulnerable to arbitrary file deletion in versions up to, and including 32022-09-07
CVEList
Download Manager <= 3.2.50 - Authenticated (Contributor+) Arbitrary File Deletion2022-09-06
CVE-2022-2431 — External Control of File Name or Path | cvebase