CVE-2026-2419
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows authenticated attackers with Administrator-level access to configure the WP-DownloadManager plugin to access and list any files on the server, potentially exposing sensitive information. It occurs due to a flaw in how the plugin checks file paths, which can be exploited if the attacker has the right permissions.
Technical Description
The WP-DownloadManager plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.69 via the 'download_path' configuration parameter. This is due to insufficient validation of the download path setting, which allows directory traversal sequences to bypass the WP_CONTENT_DIR prefix check. This makes it possible for authenticated attackers, with Administrator-level access and above, to configure the plugin to list and access arbitrary files on the server by exploiting the file browser functionality.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 18, 2026
about 2 months ago
Last Modified
Feb 18, 2026
about 2 months ago