Description
WordPress Plugin Simple Download Monitor is prone to multiple vulnerabilities, including cross-site scripting and SQL injection vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials, or to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. WordPress Plugin Simple Download Monitor version 3.8.8 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 3.8.9 or latest
References
https://jvn.jp/en/jp/JVN31425618/index.html
https://plugins.svn.wordpress.org/simple-download-monitor/trunk/readme.txt
Related Vulnerabilities
Microsoft SQL Server Elevation of Privilege Vulnerability (CVE-2021-1636)
WordPress Plugin Fonts-Google Fonts Typography Cross-Site Scripting (3.0.2)
WordPress Plugin Zephyr Project Manager Multiple Vulnerabilities (3.2.42)
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-2079)
RubyGems Improper Verification of Cryptographic Signature Vulnerability (CVE-2018-1000076)