CVE-2022-45836

7.1 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to inject malicious scripts into WordPress sites using the Download Manager plugin. When users click specially crafted links, the scripts execute in their browsers, potentially stealing credentials or performing unauthorized actions. All WordPress sites running Download Manager plugin version 3.2.59 or earlier are affected.

💻 Affected Systems

Products:
  • WordPress Download Manager plugin by W3 Eden, Inc.
Versions: <= 3.2.59
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with the vulnerable plugin version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take over the WordPress site, install backdoors, or redirect users to malicious sites, leading to complete compromise.

🟠

Likely Case

Attackers typically use this to steal session cookies, perform phishing attacks, or deface websites by injecting malicious content visible to users.

🟢

If Mitigated

With proper input validation and output encoding, the malicious scripts would be rendered harmless as text rather than executable code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly exploited via phishing emails or malicious links. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.60 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/download-manager/wordpress-download-manager-plugin-3-2-59-reflected-cross-site-scripting-xss-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Download Manager plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Temporary plugin deactivation

all

Disable the Download Manager plugin until patched to prevent exploitation.

wp plugin deactivate download-manager

Web Application Firewall (WAF) rules

all

Configure WAF to block XSS payloads targeting the vulnerable endpoint.

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution sources
  • Use browser security features like HttpOnly cookies and SameSite attributes

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Download Manager version number.

Check Version:

wp plugin get download-manager --field=version

Verify Fix Applied:

Confirm plugin version is 3.2.60 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET/POST requests with script tags or JavaScript code in parameters
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • HTTP requests containing <script>, javascript:, or encoded XSS payloads in URL parameters

SIEM Query:

source="web_server_logs" AND ("<script>" OR "javascript:" OR "%3Cscript%3E") AND uri_path="/wp-content/plugins/download-manager/"

🔗 References

📤 Share & Export