The Download Attachments plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'download-attachments' shortcode in all versions up to, and including, 1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00163}

epss

{'score': 0.00287}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00102}

epss

{'score': 0.00163}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-06-04T05:32:15.260Z

Updated: 2024-08-01T20:05:08.375Z

Reserved: 2024-04-02T18:51:32.001Z

Link: CVE-2024-3230

cve-icon Vulnrichment

Updated: 2024-08-01T20:05:08.375Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-04T06:15:10.270

Modified: 2024-11-21T09:29:11.920

Link: CVE-2024-3230

cve-icon Redhat

No data.