
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-0828 affects the Download Manager WordPress plugin versions before 3.2.34. The vulnerability was discovered and disclosed in April 2022. The plugin uses the uniqid PHP function to generate master keys for downloads, which introduces a security weakness in the download access control mechanism (NVD, WPScan).
The vulnerability is classified as CWE-338 (Use of Cryptographically Weak Pseudo-Random Number Generator). The CVSS v3.1 base score is 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. The vulnerability stems from the implementation of the uniqid PHP function for generating master keys, which produces predictable values that can be exploited (NVD).
The vulnerability allows attackers to bypass role-based restrictions and password protections set for downloads. By successfully exploiting this vulnerability, unauthorized users can gain direct download access to protected files, potentially exposing sensitive or restricted content (WPScan).
Users are advised to update the Download Manager WordPress plugin to version 3.2.34 or later, which addresses this vulnerability by implementing more secure key generation methods (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."