vulnerability
WordPress Plugin: download-monitor: CVE-2021-31567: Files or Directories Accessible to External Parties
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:S/C:C/I:N/A:N) | Oct 29, 2021 | May 15, 2025 | Jul 10, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:C/I:N/A:N)
Published
Oct 29, 2021
Added
May 15, 2025
Modified
Jul 10, 2025
Description
Authenticated (admin+) Arbitrary File Download vulnerability discovered in Download Monitor WordPress plugin (versions less than or equal to 4.4.6). The plugin allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the anddownloadable_file_urls[0] parameter data. It's also possible to escape from the web server home directory and download any file within the OS.
Solution
download-monitor-plugin-cve-2021-31567
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.