CVE-2021-34639
05.08.2021, 21:15
Authenticated File Upload in WordPress Download Manager <= 3.1.24 allows authenticated (Author+) users to upload files with a double extension, e.g. "payload.php.png" which is executable in some configurations. This issue affects: WordPress Download Manager version 3.1.24 and prior versions.Enginsight
Vendor | Product | Version |
---|---|---|
w3eden | download_manager | 𝑥 ≤ 3.1.24 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-646 - Reliance on File Name or Extension of Externally-Supplied FileThe software allows a file to be uploaded, but it relies on the file name or extension of the file to determine the appropriate behaviors. This could be used by attackers to cause the file to be misclassified and processed in a dangerous fashion.
- CWE-434 - Unrestricted Upload of File with Dangerous TypeThe software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.