Vulnerabilities and security researches forsimple-download-monitor simple-download-monitor
Direction: ascendingJun 07, 2024
Simple Download Monitor # CVE-2018-5212
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 04, 2018
- Research Description
- The Simple Download Monitor plugin before 3.5.4 for WordPress has XSS via the sdm_upload_thumbnail (aka File Thumbnail) parameter in an edit action to wp-admin/post.php.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Simple Download Monitor # CVE-2021-24692
- CVE, Research URL
- Home page URL
- Application
- Date
- Mar 14, 2022
- Research Description
- The Simple Download Monitor WordPress plugin before 3.9.5 allows users with a role as low as Contributor to download any file on the web server (such as wp-config.php) via a path traversal vector.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Simple Download Monitor # CVE-2021-24694
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 24, 2022
- Research Description
- The Simple Download Monitor WordPress plugin before 3.9.11 could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attack via 1) "color" or "css_class" argument of sdm_download shortcode, 2) "class" or "placeholder" argument of sdm_search_form shortcode.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Simple Download Monitor # CVE-2021-24696
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 24, 2022
- Research Description
- The Simple Download Monitor WordPress plugin before 3.9.9 does not enforce nonce checks, which could allow attackers to perform CSRF attacks to 1) make admins export logs to exploit a separate log disclosure vulnerability (fixed in 3.9.6), 2) delete logs (fixed in 3.9.9), 3) remove thumbnail image from downloads
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Simple Download Monitor # CVE-2021-24693
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 08, 2021
- Research Description
- The Simple Download Monitor WordPress plugin before 3.9.5 does not escape the "File Thumbnail" post meta before outputting it in some pages, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks. Given the that XSS is triggered even when the Download is in a review state, contributor could make JavaScript code execute in a context of a reviewer such as admin and make them create a rogue admin account, or install a malicious plugin
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Simple Download Monitor # CVE-2021-24695
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 08, 2021
- Research Description
- The Simple Download Monitor WordPress plugin before 3.9.6 saves logs in a predictable location, and does not have any authentication or authorisation in place to prevent unauthenticated users to download and read the logs containing Sensitive Information such as IP Addresses and Usernames
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Simple Download Monitor # CVE-2021-24697
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 08, 2021
- Research Description
- The Simple Download Monitor WordPress plugin before 3.9.5 does not escape the 1) sdm_active_tab GET parameter and 2) sdm_stats_start_date/sdm_stats_end_date POST parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting issues
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Simple Download Monitor # CVE-2021-24698
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 08, 2021
- Research Description
- The Simple Download Monitor WordPress plugin before 3.9.6 allows users with a role as low as Contributor to remove thumbnails from downloads they do not own, even if they cannot normally edit the download.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Simple Download Monitor # CVE-2020-5650
- CVE, Research URL
- Home page URL
- Application
- Date
- Oct 21, 2020
- Research Description
- Cross-site scripting vulnerability in Simple Download Monitor 3.8.8 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Simple Download Monitor # CVE-2020-5651
- CVE, Research URL
- Home page URL
- Application
- Date
- Oct 21, 2020
- Research Description
- SQL injection vulnerability in Simple Download Monitor 3.8.8 and earlier allows remote attackers to execute arbitrary SQL commands via a specially crafted URL.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Simple Download Monitor # CVE-2018-5213
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 04, 2018
- Research Description
- The Simple Download Monitor plugin before 3.5.4 for WordPress has XSS via the sdm_upload (aka Downloadable File) parameter in an edit action to wp-admin/post.php.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Jan 26, 2025
Simple Download Monitor # CVE-2025-24663
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 24, 2025
- Research Description
- Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tips and Tricks HQ, Ruhul Amin, Josh Lobe Simple Download Monitor allows Blind SQL Injection. This issue affects Simple Download Monitor: from n/a through 3.9.25.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable