CVE-2022-0828: WordPress plugin vulnerability

Published by CVE Tracker on

The Download Manager WordPress plugin before 3.2.39 uses the uniqid php function to generate the master key for a download, allowing an attacker to brute force the key with reasonable resources giving direct download access regardless of role based restrictions or password protections set for the download.

How to mitigate CVE-2022-0828

Time needed: 5 minutes.

Follow the instructions, as they will assist you in mitigating the WordPress vulnerability that been reported in CVE-2022-0828.

  1. Install the latest version of WordPress

    Navigate to the official WordPress website and download the latest version of WordPress. The latest version contains the CVE-2022-0828 fix.
    Update to the latest version

  2. Perform a vulnerability assessment

    Perform a scan on your WordPress environment(s), and check for vulnerabilities. Verify if CVE-2022-0828 has been mitigated.

  3. Utilize the references

    The CVE-2022-0828 references have been provided for a reason. Utilize these references and make sure that you are correctly informed.

References

  • wpscan.com/vulnerability/7f0742ad-6fd7-4258-9e44-d42e138789bb
  • Share this information