The wp-file-download WordPress plugin before 6.2.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting
History

Wed, 02 Jul 2025 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Joomunited
Joomunited wp File Download
Weaknesses CWE-79
CPEs cpe:2.3:a:joomunited:wp_file_download:*:*:*:*:*:wordpress:*:*
Vendors & Products Joomunited
Joomunited wp File Download

Mon, 23 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Jun 2025 20:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Sat, 21 Jun 2025 06:15:00 +0000

Type Values Removed Values Added
Description The wp-file-download WordPress plugin before 6.2.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting
Title WP File Download < 6.2.6 - Reflected XSS
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2025-06-21T06:00:08.917Z

Updated: 2025-06-23T20:13:53.719Z

Reserved: 2025-05-21T12:35:19.408Z

Link: CVE-2025-5034

cve-icon Vulnrichment

Updated: 2025-06-23T20:13:35.787Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-21T06:15:18.363

Modified: 2025-07-02T19:00:24.197

Link: CVE-2025-5034

cve-icon Redhat

No data.