CVE-2022-2168 Scanner
CVE-2022-2168 Scanner - Cross-Site Scripting (XSS) vulnerability in WordPress Download Manager
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
9 days 17 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
-
The WordPress Download Manager plugin is widely used by website administrators who need to manage downloadable files on their sites. It is especially popular among businesses and individual users who sell digital products and need a reliable tool to distribute files securely. The plugin integrates seamlessly with WordPress, utilizing user-friendly interfaces that make file management efficient for both seasoned developers and novice users.
The detected vulnerability pertains to Cross-Site Scripting (XSS), where the plugin does not properly sanitize the user_ids parameter. This flaw allows attackers who have authenticated access to inject malicious JavaScript through the vulnerable parameter. As XSS vulnerabilities can lead to unauthorized actions and data access, it poses a significant security threat. These attacks typically manipulate JavaScript to execute in the context of other users' browsers, compromising data integrity.
Technically, the vulnerability lies within the stats history dashboard of the plugin. The problematic area involves inadequate sanitization of entries involving the user_ids parameter. By crafting a malicious request, an attacker can bypass existing checks and execute arbitrary scripts. These scripts can then potentially affect other users who view the content on the affected site.
Exploitation of this vulnerability can lead to numerous undesirable effects including unauthorized data manipulation, cookie theft, and unauthorized actions performed on behalf of users. XSS attacks might also degrade user trust and affect the reputation of the website affected. Moreover, it might enable attackers to spread malware or redirect users to harmful sites.
REFERENCES