{"api_version":"1","generated_at":"2026-05-06T07:33:42+00:00","cve":"CVE-2021-24773","urls":{"html":"https://cve.report/CVE-2021-24773","api":"https://cve.report/api/cve/CVE-2021-24773.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-24773","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-24773"},"summary":{"title":"CVE-2021-24773","description":"The WordPress Download Manager WordPress plugin before 3.2.16 does not escape some of the Download settings when outputting them, allowing high privilege users to perform XSS attacks even when the unfiltered_html capability is disallowed","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2021-11-01 09:15:00","updated_at":"2021-11-02 17:16:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/aab2ddbb-7675-40fc-90ee-f5bfa8a5b995","name":"https://wpscan.com/vulnerability/aab2ddbb-7675-40fc-90ee-f5bfa8a5b995","refsource":"MISC","tags":[],"title":"Attention Required! | Cloudflare","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-24773","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-24773","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Huy Nguyen (Inval1d Team)","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"24773","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"wpdownloadmanager","cpe5":"wordpress_download_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2021-24773","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"WordPress Download Manager < 3.2.16 - Admin+ Stored Cross-Site Scripting"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"WordPress Download Manager","version":{"version_data":[{"version_affected":"<","version_name":"3.2.16","version_value":"3.2.16"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The WordPress Download Manager WordPress plugin before 3.2.16 does not escape some of the Download settings when outputting them, allowing high privilege users to perform XSS attacks even when the unfiltered_html capability is disallowed"}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://wpscan.com/vulnerability/aab2ddbb-7675-40fc-90ee-f5bfa8a5b995","name":"https://wpscan.com/vulnerability/aab2ddbb-7675-40fc-90ee-f5bfa8a5b995"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-79 Cross-site Scripting (XSS)","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"Huy Nguyen (Inval1d Team)"}],"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2021-11-01 09:15:00","lastModifiedDate":"2021-11-02 17:16:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":4.8,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.7,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.5},"severity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"3.2.16","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"24773","Ordinal":"199535","Title":"CVE-2021-24773","CVE":"CVE-2021-24773","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"24773","Ordinal":"1","NoteData":"The WordPress Download Manager WordPress plugin before 3.2.16 does not escape some of the Download settings when outputting them, allowing high privilege users to perform XSS attacks even when the unfiltered_html capability is disallowed","Type":"Description","Title":null},{"CveYear":"2021","CveId":"24773","Ordinal":"2","NoteData":"2021-11-01","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"24773","Ordinal":"3","NoteData":"2021-11-01","Type":"Other","Title":"Modified"}]}}}