CVE-2025-4367
📋 TL;DR
The Download Manager WordPress plugin has a stored XSS vulnerability in all versions up to 3.3.18. Authenticated attackers with author-level access or higher can inject malicious scripts via the wpdm_user_dashboard shortcode, which execute when users view compromised pages.
💻 Affected Systems
- WordPress Download Manager plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal admin credentials, redirect users to malicious sites, deface websites, or install backdoors leading to complete site compromise.
Likely Case
Attackers with author accounts inject malicious scripts to steal user session cookies or redirect visitors to phishing pages.
If Mitigated
With proper user role management and input validation, impact is limited to isolated script execution without privilege escalation.
🎯 Exploit Status
Exploitation requires authenticated access with author privileges or higher. Public proof-of-concept exists in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.3.19
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Download Manager and click 'Update Now'. 4. Verify version is 3.3.19 or higher.
🔧 Temporary Workarounds
Remove vulnerable shortcode usage
allTemporarily remove or disable the wpdm_user_dashboard shortcode from posts/pages
Restrict user roles
allReview and minimize users with author or higher privileges
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block XSS payloads
- Disable the Download Manager plugin entirely until patched
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for Download Manager version. If version ≤ 3.3.18, vulnerable.
Check Version:
wp plugin list --name='download-manager' --field=version
Verify Fix Applied:
After update, confirm Download Manager version is 3.3.19 or higher in WordPress plugins list.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to pages with wpdm_user_dashboard shortcode
- Multiple failed login attempts followed by successful author-level login
Network Indicators:
- Script tags with suspicious attributes in page content
- Unexpected outbound connections from WordPress pages
SIEM Query:
source="wordpress" AND ("wpdm_user_dashboard" OR "download-manager") AND ("script" OR "onerror" OR "onload")
🔗 References
- https://plugins.trac.wordpress.org/browser/download-manager/trunk/src/User/views/dashboard/profile.php#L79
- https://plugins.trac.wordpress.org/browser/download-manager/trunk/src/wpdm-functions.php#L200
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3313608%40download-manager&old=3308801%40download-manager&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/029956d7-6e3f-4159-9f53-05691e0262fc?source=cve