WordPress Plugin Filedownload is prone to multiple vulnerabilities, including open proxy, cross-site scripting and SQL injection vulnerabilities because it fails to properly verify and sanitize user-supplied input. An attacker may leverage these issues to hide attacks directed at a target site from behind vulnerable website, to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, to steal cookie-based authentication credentials, to compromise the application, access or modify data or to exploit vulnerabilities in the underlying database. WordPress Plugin Filedownload version 1.4 is vulnerable; prior versions may also be affected.
Edit the source code to ensure that input is properly verified and sanitised or disable the plugin until a fix is available
WordPress Plugin Lightbox Photo Gallery Cross-Site Request Forgery (1.0)
WordPress Plugin YITH Product Size Charts for WooCommerce Security Bypass (1.1.11)
WordPress Plugin Shopp Multiple Vulnerabilities (1.0.17)
WordPress Plugin Contact Form by Supsystic Cross-Site Scripting (1.7.19)
WordPress Plugin Frontend Uploader Cross-Site Scripting (0.9.2)