CVE-2026-2426
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with Administrator-level access to delete any file on the server, including critical files like the configuration file for WordPress. By exploiting this flaw in the WP-DownloadManager plugin, they could potentially gain control over the website or server.
Technical Description
The WP-DownloadManager plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.69 via the 'file' parameter in the file deletion functionality. This is due to insufficient validation of user-supplied file paths, allowing directory traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can lead to remote code execution when critical files like wp-config.php are deleted.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 18, 2026
about 2 months ago
Last Modified
Feb 18, 2026
about 2 months ago