Description
The Download Manager plugin for WordPress is vulnerable to unauthorized access of sensitive information in all versions up to, and including, 3.3.32. This is due to missing authorization and capability checks on the `wpdm_media_access` AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve passwords and access control settings for protected media attachments, which can then be used to bypass the intended media protection and download restricted files.
Published: 2025-12-18
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized disclosure of media passwords
Action: Patch immediately
AI Analysis

Impact

The Download Manager plugin for WordPress contains a flaw where the wpdm_media_access AJAX action performs no authorization or capability checks. An attacker who is authenticated, even with only Subscriber level access or higher, can fetch the passwords and access control settings that protect media attachments. Those retrieved credentials enable the attacker to sidestep the intended media protection mechanism and download files that should be restricted. The vulnerability is a straightforward case of missing authorization (CWE-862). The likely attack vector is via in‑application AJAX calls that expose sensitive data without verifying the user’s permissions.

Affected Systems

The affected product is the codename065:Download Manager WordPress plugin, specifically all released versions up to and including 3.3.32. No other products or vendors are listed as affected.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity. EPSS is below 1%, suggesting that widespread exploitation is unlikely at this time, and the vulnerability is not listed in CISA’s KEV catalog. Nonetheless, any site that has Subscriber–level users can be leveraged to retrieve media passwords, giving those users control over restricted content. Because the flaw requires only authenticated access, the risk to sites with large subscriber bases is non‑negligible, but it does not allow remote code execution or unrestricted system compromise.

Generated by OpenCVE AI on April 21, 2026 at 00:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Download Manager plugin to the latest version that addresses this issue (version 3.3.33 or newer).
  • Restrict Subscriber–level users from triggering wpdm_media_access by reconfiguring the plugin’s capability settings or by applying custom code to enforce higher capability checks.
  • Review existing media attachment passwords and regenerate them to ensure that any credentials exposed during the vulnerability window are no longer valid.

Generated by OpenCVE AI on April 21, 2026 at 00:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Codename065
Codename065 download Manager Plugin
Wordpress
Wordpress wordpress
Vendors & Products Codename065
Codename065 download Manager Plugin
Wordpress
Wordpress wordpress

Thu, 18 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 07:45:00 +0000

Type Values Removed Values Added
Description The Download Manager plugin for WordPress is vulnerable to unauthorized access of sensitive information in all versions up to, and including, 3.3.32. This is due to missing authorization and capability checks on the `wpdm_media_access` AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve passwords and access control settings for protected media attachments, which can then be used to bypass the intended media protection and download restricted files.
Title Download Manager <= 3.3.32 - Missing Authorization to Authenticated (Subscriber+) Media Attachment Password Disclosure
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Codename065 Download Manager Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:32:41.969Z

Reserved: 2025-11-21T01:04:54.935Z

Link: CVE-2025-13498

cve-icon Vulnrichment

Updated: 2025-12-18T15:26:48.255Z

cve-icon NVD

Status : Deferred

Published: 2025-12-18T08:15:49.337

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13498

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T00:45:23Z

Weaknesses