VYPR
Unrated severityNVD Advisory· Published Sep 4, 2014· Updated May 6, 2026

CVE-2012-4768

CVE-2012-4768

Description

Cross-site scripting (XSS) vulnerability in the Download Monitor plugin before 3.3.5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the dlsearch parameter to the default URI.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in Download Monitor plugin before 3.3.5.9 allows remote attackers to inject arbitrary script via the dlsearch parameter.

Vulnerability

A reflected cross-site scripting (XSS) vulnerability exists in the Download Monitor plugin for WordPress, in versions prior to 3.3.5.9. The flaw is located in the handling of the dlsearch parameter when it is passed to the default URI. The parameter is not properly sanitized or escaped before being reflected back to the user, allowing arbitrary HTML and JavaScript injection. Affected versions are all builds of the plugin before 3.3.5.9 [1].

Exploitation

An attacker can exploit this vulnerability by crafting a malicious URL containing the dlsearch parameter with injected script content. No authentication is required; the attacker simply needs to trick a victim into visiting this crafted URL (for example, via email or a link on another site). The victim's browser will then execute the injected script in the context of the WordPress site's domain.

Impact

Successful exploitation allows the attacker to execute arbitrary web script or HTML in the browser of the victim. This can lead to session hijacking, credential theft, redirection to malicious sites, or defacement of the page, depending on the attacker's payload. The attacker gains no access to the server itself, but can carry out actions on behalf of the victim within the WordPress site.

Mitigation

The vulnerability is fixed in version 3.3.5.9 of the Download Monitor plugin. Users should update to this version or later. As the plugin is no longer actively maintained in some repositories, verifying the latest official release is recommended. No workaround is disclosed in the available references [1].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.