CVE-2020-24141

Server-side request forgery in the WP-DownloadManager plugin 1.68.4 for WordPress lets an attacker send crafted requests from the back-end server of a vulnerable web application via the file_remote parameter to download-add.php. It can help identify open ports, local network hosts and execute command on services
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:wp-downloadmanager_project:wp-downloadmanager:1.68.4:*:*:*:*:wordpress:*:*

History

05 Oct 2021, 16:46

Type Values Removed Values Added
CPE cpe:2.3:a:wp-downloadmanager_project:wp-download_manager:1.68.4:*:*:*:*:wordpress:*:* cpe:2.3:a:wp-downloadmanager_project:wp-downloadmanager:1.68.4:*:*:*:*:wordpress:*:*

09 Jul 2021, 18:47

Type Values Removed Values Added
CPE cpe:2.3:a:wp-downloadmanager_project:wp-download_manager:1.68.4:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 5.3
CWE CWE-918
References (MISC) https://github.com/secwx/research/blob/main/cve/CVE-2020-24141.md - (MISC) https://github.com/secwx/research/blob/main/cve/CVE-2020-24141.md - Third Party Advisory

07 Jul 2021, 15:08

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-07 14:15

Updated : 2023-12-10 13:55


NVD link : CVE-2020-24141

Mitre link : CVE-2020-24141

CVE.ORG link : CVE-2020-24141


JSON object : View

Products Affected

wp-downloadmanager_project

  • wp-downloadmanager
CWE
CWE-918

Server-Side Request Forgery (SSRF)