A Cross-Site Scripting (XSS) vulnerability has been discovered in the WordPress Download CloudNet360 plugin. This vulnerability could allow a malicious actor to inject malicious scripts into the website, which would be executed when visitors visit the affected site.

This vulnerability was discovered and reported by Nithissh S.

The vulnerability is caused by a lack of input validation in the plugin’s code. This allows an attacker to inject malicious scripts into the website, which are then executed when visitors visit the site.


7.1 High severity CVSS 3.1 score

Affected Versions:

All versions of the WordPress Download CloudNet360 plugin are affected by this vulnerability.


An attacker who successfully exploits this vulnerability could inject malicious scripts into the website. This could allow the attacker to steal sensitive data, redirect visitors to malicious websites, or take control of the website.


Due to the critical nature of this vulnerability, immediate action is essential:

  1. Temporary Deactivation: As an initial safety measure, contemplate temporarily deactivating the Download CloudNet360 Plugin. This can minimize the risk of exploitation until a patched version becomes available.
  2. Plugin Updates: Stay vigilant for updates related to the Download CloudNet360 Plugin. Once a new version that addresses this vulnerability is released, update the plugin to the most recent version.
  3. Security Audit: Following the application of updates, execute a thorough security audit on the WordPress website to verify that the vulnerability has been effectively rectified.
  4. Monitoring and Scanning: Regularly observe the website for any unusual activities and perform security scans to detect potential issues.
  5. Stay Informed: Stay informed about the latest developments concerning the Download CloudNet360 Plugin, including updates regarding the vulnerability and the issuance of a fixed version.