The Simple Downloads List plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wp_ajax_neofix_sdl_edit' AJAX endpoint along with many others in all versions up to, and including, 1.4.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to alter many of the plugin's settings/downloads and inject malicious web scripts.
Metrics
Affected Vendors & Products
References
History
Sat, 08 Nov 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Simple Downloads List plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wp_ajax_neofix_sdl_edit' AJAX endpoint along with many others in all versions up to, and including, 1.4.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to alter many of the plugin's settings/downloads and inject malicious web scripts. | |
| Title | Simple Downloads List <= 1.4.3 - Missing Authorization to Authenticated (Subscriber+) Stored Cross-Site Scripting | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-11-08T02:28:03.760Z
Updated: 2025-11-08T02:28:03.760Z
Reserved: 2025-10-31T21:49:34.280Z
Link: CVE-2025-12583
No data.
Status : Received
Published: 2025-11-08T03:15:36.350
Modified: 2025-11-08T03:15:36.350
Link: CVE-2025-12583
No data.