Impact
The Download Manager WordPress plugin has a reflected cross‑site scripting flaw that permits an attacker to inject arbitrary JavaScript. The flaw arises because the user_ids parameter is not properly sanitized or escaped before being echoed back in the page. This means that any visitor who clicks a crafted link can have malicious code run in their browser. Based on the description, it is inferred that an attacker could hijack the victim’s session, deface website content, or use the injected script to launch additional web‑based attacks, such as phishing or credential theft.
Affected Systems
WordPress installations that have the Download Manager plugin from codename065. All versions up to 3.3.23 are affected; any site using those versions is vulnerable.
Risk and Exploitability
The CVSS base score of 6.1 classifies this issue as moderate severity. The EPSS score of less than 1% suggests that current exploitation in the wild is unlikely, and the vulnerability is not listed in CISA’s KEV catalog. Attackers can exploit the flaw in an unauthenticated manner by creating a URL that contains malicious content in the user_ids parameter and luring a victim to visit that link. Successful exploitation requires only that a user follow a malicious link, making the threat straightforward to launch if the attacker can target visitors.
OpenCVE Enrichment
EUVD