Server-side Request Forgery in WP-DownloadManager Plugin 1.68.4 for WordPress Allows Port Scanning, Network Host Identification, and Command Execution

Server-side Request Forgery in WP-DownloadManager Plugin 1.68.4 for WordPress Allows Port Scanning, Network Host Identification, and Command Execution

CVE-2020-24141 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Server-side request forgery in the WP-DownloadManager plugin 1.68.4 for WordPress lets an attacker send crafted requests from the back-end server of a vulnerable web application via the file_remote parameter to download-add.php. It can help identify open ports, local network hosts and execute command on services

Learn more about our Wordpress Pen Testing.