The Simple Downloads List plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wp_ajax_neofix_sdl_edit' AJAX endpoint along with many others in all versions up to, and including, 1.4.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to alter many of the plugin's settings/downloads and inject malicious web scripts.
History

Sat, 08 Nov 2025 02:45:00 +0000

Type Values Removed Values Added
Description The Simple Downloads List plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wp_ajax_neofix_sdl_edit' AJAX endpoint along with many others in all versions up to, and including, 1.4.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to alter many of the plugin's settings/downloads and inject malicious web scripts.
Title Simple Downloads List <= 1.4.3 - Missing Authorization to Authenticated (Subscriber+) Stored Cross-Site Scripting
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-11-08T02:28:03.760Z

Updated: 2025-11-08T02:28:03.760Z

Reserved: 2025-10-31T21:49:34.280Z

Link: CVE-2025-12583

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-08T03:15:36.350

Modified: 2025-11-08T03:15:36.350

Link: CVE-2025-12583

cve-icon Redhat

No data.