WP-DownloadManager Vulnerability (Low) – CVE-2026-2419

WP-DownloadManager Vulnerability (Low) – CVE-2026-2419

by | Feb 17, 2026 | Plugins

Attack Vectors

CVE-2026-2419 affects the WP-DownloadManager WordPress plugin (slug: wp-downloadmanager) in versions 1.69 and earlier. This is a Low severity issue (CVSS 2.7) that requires an authenticated user with Administrator-level access (or higher) to exploit.

The primary attack path is through the plugin’s configuration, specifically the download_path setting. An attacker with sufficient privileges could use directory traversal sequences to bypass expected path restrictions, then use the plugin’s file browser functionality to list and access files outside the intended WordPress content area.

Security Weakness

The underlying weakness is insufficient validation of the download_path configuration parameter in WP-DownloadManager <= 1.69. The plugin attempts to enforce a restriction based on the WP_CONTENT_DIR prefix, but traversal sequences can bypass that check, allowing access to unintended server locations.

Because this is tied to an administrative configuration setting, the risk most often shows up in real-world scenarios where admin accounts are over-provisioned, shared, reused across vendors, or compromised via unrelated phishing or credential reuse.

Technical or Business Impacts

Even at low severity, arbitrary file read can create meaningful business exposure. If an Administrator account is compromised, an attacker may be able to access sensitive files on the server that were never meant to be visible through WordPress, increasing the chance of data leakage.

For marketing leaders and executives, the practical impacts may include: unintended exposure of confidential business documents, internal configuration information, or other files that could be used to accelerate broader attacks. This can elevate compliance risk and create reputational harm if sensitive data is disclosed.

Remediation: Update WP-DownloadManager to version 1.69.1 or newer patched version. Also review who has Administrator access, remove unnecessary admin accounts, and ensure third-party agencies or contractors have the minimum privileges required.

Similar Attacks

Path traversal and arbitrary file read flaws have been used across many platforms to expose sensitive server files. Examples include:

CVE-2021-41773 (Apache HTTP Server Path Traversal)

CVE-2021-22205 (GitLab ExifTool-related file read/RCE chain)

CVE-2018-7600 (Drupal “Drupalgeddon 2” widely exploited attack chain)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers