WP-DownloadManager Vulnerability (Medium) – CVE-2026-2426

WP-DownloadManager Vulnerability (Medium) – CVE-2026-2426

by | Feb 18, 2026 | Plugins

Attack Vectors

WP-DownloadManager (slug: wp-downloadmanager) versions 1.69 and below contain a medium-severity vulnerability (CVSS 6.5) that can be exploited by an authenticated user with Administrator-level access (or higher). The issue is triggered through the plugin’s file deletion feature by manipulating the ‘file’ parameter to include directory traversal sequences.

In practical terms, this means the attack path typically starts with a compromised admin account (phishing, password reuse, or stolen credentials) or an insider with admin privileges. Once an attacker has that level of access, they may be able to delete files outside the intended plugin directory by providing a crafted file path.

Security Weakness

The weakness is a Path Traversal flaw in WP-DownloadManager’s file deletion functionality. According to the advisory, the plugin does not sufficiently validate user-supplied file paths in the ‘file’ parameter, which allows directory traversal sequences to influence what file is deleted.

Because the action is performed by an administrator-level user, it can be easy for organizations to underestimate the risk. However, “admin-only” vulnerabilities are still critical to business resilience because attackers often target privileged accounts specifically—and once obtained, admin access becomes a launchpad for high-impact actions.

Technical or Business Impacts

The immediate impact is arbitrary file deletion on the server by an attacker with Administrator+ access. This can cause site outages and operational disruption if key application files are removed.

From a business-risk perspective, this vulnerability can escalate into more severe outcomes. The advisory notes that deleting critical files such as wp-config.php can lead to remote code execution, which could enable deeper compromise and prolonged downtime. For marketing and executive stakeholders, this translates into potential lost revenue, campaign disruption, reputational damage, and increased incident response costs. Compliance and risk teams should also consider whether service availability commitments, customer notification requirements, or audit obligations could be triggered by an outage or broader compromise.

Recommended action: Update WP-DownloadManager to version 1.69.1 or a newer patched version as soon as possible. Reference: CVE-2026-2426 and the vendor intelligence source Wordfence advisory.

Similar Attacks

While this specific issue requires Administrator+ access, real-world incidents show how quickly a WordPress foothold can become a business problem—especially when attackers gain privileged control.

Examples of high-profile WordPress-related compromises include:

WPForms security issue (admin creation risk) – Wordfence coverage
WooCommerce Payments vulnerability – Wordfence coverage
Elementor Pro vulnerability – Wordfence coverage

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers