CVE-2012-4768
Description
Cross-site scripting (XSS) vulnerability in the Download Monitor plugin before 3.3.5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the dlsearch parameter to the default URI.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Reflected XSS in Download Monitor plugin before 3.3.5.9 allows remote attackers to inject arbitrary script via the dlsearch parameter.
Vulnerability
A reflected cross-site scripting (XSS) vulnerability exists in the Download Monitor plugin for WordPress, in versions prior to 3.3.5.9. The flaw is located in the handling of the dlsearch parameter when it is passed to the default URI. The parameter is not properly sanitized or escaped before being reflected back to the user, allowing arbitrary HTML and JavaScript injection. Affected versions are all builds of the plugin before 3.3.5.9 [1].
Exploitation
An attacker can exploit this vulnerability by crafting a malicious URL containing the dlsearch parameter with injected script content. No authentication is required; the attacker simply needs to trick a victim into visiting this crafted URL (for example, via email or a link on another site). The victim's browser will then execute the injected script in the context of the WordPress site's domain.
Impact
Successful exploitation allows the attacker to execute arbitrary web script or HTML in the browser of the victim. This can lead to session hijacking, credential theft, redirection to malicious sites, or defacement of the page, depending on the attacker's payload. The attacker gains no access to the server itself, but can carry out actions on behalf of the victim within the WordPress site.
Mitigation
The vulnerability is fixed in version 3.3.5.9 of the Download Monitor plugin. Users should update to this version or later. As the plugin is no longer actively maintained in some repositories, verifying the latest official release is recommended. No workaround is disclosed in the available references [1].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- cpe:2.3:a:mikejolley:download_monitor:3.3.5.7:*:*:*:*:wordpress:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- archives.neohapsis.com/archives/bugtraq/2012-09/0042.htmlnvdExploit
- packetstormsecurity.org/files/116408/wpdownloadmonitor3357-xss.txtnvdExploit
- osvdb.org/85319nvd
- secunia.com/advisories/50511nvd
- www.reactionpenetrationtesting.co.uk/wordpress-download-monitor-xss.htmlnvd
- exchange.xforce.ibmcloud.com/vulnerabilities/78422nvd
News mentions
0No linked articles in our index yet.