Lucene search

K
cvelistWordfenceCVELIST:CVE-2021-34639
HistoryAug 05, 2021 - 8:18 p.m.

CVE-2021-34639 WordPress Download Manager <= 3.1.24 Authenticated Arbitrary File Upload

2021-08-0520:18:29
CWE-646
Wordfence
www.cve.org

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.9%

Authenticated File Upload in WordPress Download Manager <= 3.1.24 allows authenticated (Author+) users to upload files with a double extension, e.g. “payload.php.png” which is executable in some configurations. This issue affects: WordPress Download Manager version 3.1.24 and prior versions.

CNA Affected

[
  {
    "product": "WordPress Download Manager",
    "vendor": "W3 Eden, Inc.",
    "versions": [
      {
        "lessThanOrEqual": "3.1.24",
        "status": "affected",
        "version": "3.1.24",
        "versionType": "custom"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.9%

Related for CVELIST:CVE-2021-34639