The Download Monitor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_handle_api_key_actions function in all versions up to, and including, 5.0.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to revoke existing API keys and generate new ones.
Metrics
Affected Vendors & Products
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 28 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 26 Oct 2024 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Download Monitor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_handle_api_key_actions function in all versions up to, and including, 5.0.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to revoke existing API keys and generate new ones. | |
| Title | Download Monitor <= 5.0.12 - Missing Authorization to API Key Manipulation | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-10-26T07:36:08.238Z
Updated: 2024-10-28T18:00:57.330Z
Reserved: 2024-10-17T15:48:51.370Z
Link: CVE-2024-10092
Updated: 2024-10-28T18:00:48.677Z
Status : Awaiting Analysis
Published: 2024-10-26T08:15:03.893
Modified: 2024-10-28T13:58:09.230
Link: CVE-2024-10092
No data.