CVE-2026-2419

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows authenticated attackers with Administrator-level access to configure the WP-DownloadManager plugin to access and list any files on the server, potentially exposing sensitive information. It occurs due to a flaw in how the plugin checks file paths, which can be exploited if the attacker has the right permissions.

Technical Description

The WP-DownloadManager plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.69 via the 'download_path' configuration parameter. This is due to insufficient validation of the download path setting, which allows directory traversal sequences to bypass the WP_CONTENT_DIR prefix check. This makes it possible for authenticated attackers, with Administrator-level access and above, to configure the plugin to list and access arbitrary files on the server by exploiting the file browser functionality.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
Confidentiality ImpactLow
Integrity ImpactNone
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$374($100-$500)
Vendor Response
Grade APatched in 0 days

Quick Information

Published

Feb 18, 2026

about 2 months ago

Last Modified

Feb 18, 2026

about 2 months ago