-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Product: WordPress plugin cm-download-manager Plugin page: https://wordpress.org/plugins/cm-download-manager/ Vendor: CreativeMindsSolutions http://cminds.com/ Vulnerability Type: CWE-79: Cross-site scripting Vulnerable Versions: 2.0.6 and below Fixed Version: 2.0.7 Solution Status: Fixed by Vendor Vendor Notification: 2014-11-27 Public Disclosure: 2014-12-02 CVE Reference: N/A. Only assigned for CSRF Criticality: Low Vulnerability details: CM Download Manager plugin for WordPress contains a flaw that allows a stored cross-site scripting (XSS) attack. This flaw exists because the /wp-admin/admin.php script does not validate input to the 'addons_title' POST parameter before returning it to users. This allows an authenticated remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server. Root cause: The software incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to authenticated users. Proof-of-concept: Insert following code to CM Downloads -> Settings -> "Downloads listing title" field with CSRF attack. - --------------- Product: WordPress plugin cm-download-manager Plugin page: https://wordpress.org/plugins/cm-download-manager/ Vendor: CreativeMindsSolutions http://cminds.com/ Vulnerability Type: CWE-352: Cross-Site Request Forgery Vulnerable Versions: 2.0.6 and below Fixed Version: 2.0.7 Solution Status: Fixed by Vendor Vendor Notification: 2014-11-27 Public Disclosure: 2014-12-02 CVE Reference: CVE-2014-9129 Criticality: Low Vulnerability details: CM Download Manager plugin for WordPress contains a flaw on the CMDM_admin_settings page as HTTP requests to /wp-admin/admin.php do not require multiple steps, explicit confirmation, or a unique token when performing sensitive actions. By tricking authenticated user into following a specially crafted link, a context-dependent attacker can perform a CSRF attack causing the victim to insert and execute arbitrary script code. Root cause: The web application does not sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. Proof-of-concept: