Download Manager Vulnerability (Medium) – CVE-2026-1666

Download Manager Vulnerability (Medium) – CVE-2026-1666

by | Feb 17, 2026 | Plugins

Attack Vectors

The WordPress plugin Download Manager (slug: download-manager) is affected by a Medium-severity Reflected Cross-Site Scripting (XSS) issue (CVE-2026-1666) in versions up to and including 3.3.46. This type of vulnerability is typically exploited by sending a crafted link to a target (for example, via email, social media messages, or a fake “account” or “download” notification) and convincing them to click it.

Because the vulnerable behavior is reachable by unauthenticated attackers and relies on user interaction, the most likely real-world scenario is a phishing-style campaign aimed at employees, contractors, or partners who have access to your site, internal portals, or shared browsers and devices.

Security Weakness

CVE-2026-1666 is caused by insufficient input sanitization and output escaping of the redirect_to parameter in the plugin’s login form shortcode. In practical terms, this means untrusted content can be reflected back into a web page in a way that a browser may execute as script.

Wordfence reports this impacts all versions up to and including 3.3.46. The risk exists when a user is tricked into taking an action such as clicking a link, aligning with the vulnerability’s classification as reflected (rather than stored) XSS.

Reference: CVE-2026-1666

Technical or Business Impacts

Even at Medium severity (CVSS 6.1; CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N), reflected XSS can create meaningful business exposure. If exploited successfully, it may enable browser-based actions that undermine trust in your digital properties and increase the chance of secondary compromise.

Business risks can include brand damage from defaced or suspicious-looking pages, reduced campaign performance if visitors encounter warnings or unusual behavior, and increased support burden from user complaints or account lockouts. For executive leadership and compliance teams, the larger concern is the potential for user data exposure and unauthorized actions in a logged-in session context, which can trigger incident response costs and reporting obligations depending on what data is accessed.

Operational impacts may include emergency maintenance windows, temporary disabling of affected features, and additional monitoring or web application firewall tuning to reduce exposure while patching is rolled out.

Remediation: Update Download Manager to version 3.3.47 or newer patched version.

Similar Attacks

Reflected XSS is a common technique used in real-world campaigns, often as part of broader phishing and credential theft efforts. Examples include:

Acunetix: Cross-Site Scripting (XSS) overview and real-world context
OWASP: Cross Site Scripting (XSS)
PortSwigger Web Security Academy: Cross-site scripting

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers