vulnerability

WordPress Plugin: download-monitor: CVE-2023-34007: Unrestricted Upload of File with Dangerous Type

Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
Jun 7, 2023
Added
May 15, 2025
Modified
Jun 24, 2025

Description

The Download Monitor plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation and access controls on the 'upload_file' function in versions up to, and including, 4.8.3. This makes it possible for authenticated attackers with subscriber-level capabilities or above to upload arbitrary files on the affected site's server which may make remote code execution possible.

Solution

download-monitor-plugin-cve-2023-34007
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.