2024-03-13 17:03:31 +00:00
{
"id" : "CVE-2023-6785" ,
"sourceIdentifier" : "security@wordfence.com" ,
"published" : "2024-03-13T16:15:08.407" ,
2025-03-21 21:03:50 +00:00
"lastModified" : "2025-03-21T19:13:55.240" ,
2025-03-12 15:03:48 +00:00
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-03-13 17:03:31 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The Download Manager plugin for WordPress is vulnerable to unauthorized file download of files added via the plugin in all versions up to, and including, 3.2.84. This makes it possible for unauthenticated attackers to download files added with the plugin (even when privately published)."
2024-04-04 08:46:00 +00:00
} ,
{
"lang" : "es" ,
"value" : "El complemento Download Manager para WordPress es vulnerable a la descarga no autorizada de archivos agregados a trav\u00e9s del complemento en todas las versiones hasta la 3.2.84 incluida. Esto hace posible que atacantes no autenticados descarguen archivos agregados con el complemento (incluso cuando se publican de forma privada)."
2024-03-13 17:03:31 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "security@wordfence.com" ,
2025-03-21 21:03:50 +00:00
"type" : "Primary" ,
2024-03-13 17:03:31 +00:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 5.3 ,
"baseSeverity" : "MEDIUM" ,
2024-03-13 17:03:31 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2024-03-13 17:03:31 +00:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 1.4
}
]
} ,
2025-03-12 15:03:48 +00:00
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
2025-03-21 21:03:50 +00:00
"value" : "CWE-862"
2025-03-12 15:03:48 +00:00
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
2025-03-21 21:03:50 +00:00
"criteria" : "cpe:2.3:a:w3eden:download_manager:*:*:*:*:free:wordpress:*:*" ,
2025-03-12 15:03:48 +00:00
"versionEndExcluding" : "3.2.85" ,
2025-03-21 21:03:50 +00:00
"matchCriteriaId" : "6AF96E84-A10F-4EED-8749-203DD4931F12"
2025-03-12 15:03:48 +00:00
}
]
}
]
}
] ,
2024-03-13 17:03:31 +00:00
"references" : [
{
"url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3038209%40download-manager%2Ftrunk&old=3022104%40download-manager%2Ftrunk&sfp_email=&sfph_mail=" ,
2025-03-12 15:03:48 +00:00
"source" : "security@wordfence.com" ,
"tags" : [
"Patch"
]
2024-03-13 17:03:31 +00:00
} ,
{
"url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7b3608ca-8ed6-46ff-8e57-d8b68f91b9f2?source=cve" ,
2025-03-12 15:03:48 +00:00
"source" : "security@wordfence.com" ,
"tags" : [
"Third Party Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3038209%40download-manager%2Ftrunk&old=3022104%40download-manager%2Ftrunk&sfp_email=&sfph_mail=" ,
2025-03-12 15:03:48 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7b3608ca-8ed6-46ff-8e57-d8b68f91b9f2?source=cve" ,
2025-03-12 15:03:48 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
2024-03-13 17:03:31 +00:00
}
]
}