Description
The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.3.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Published: 2025-04-18
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via SVG file uploads
Action: Apply Patch
AI Analysis

Impact

The vulnerability allows an authenticated user with Author or higher privileges to upload an SVG file that contains malicious scripts. Because the Download Manager plugin fails to sanitize or escape the SVG content, the scripts are stored and executed whenever the file is rendered, resulting in arbitrary client‑side code execution.

Affected Systems

The WordPress plugin Download Manager, developed by codename065, is affected in all releases up to and including version 3.3.12.

Risk and Exploitability

The CVSS score of 5.4 indicates moderate severity, while the EPSS score of less than 1% suggests a very low likelihood of exploitation. The vulnerability is not listed in CISA KEV. Exploitation requires the attacker to authenticate with Author‑level or higher access, upload a crafted SVG file, and rely on the script executing in other users’ browsers when they open the file via the plugin’s file upload interface.

Generated by OpenCVE AI on April 21, 2026 at 21:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Download Manager to version 3.3.13 or later to remove the stored XSS flaw.
  • If an immediate upgrade is not possible, disable SVG uploads entirely or enforce a strict MIME type whitelist that excludes SVG files from being stored.
  • Deploy a Content‑Security‑Policy that blocks inline scripts and restricts script sources to trusted origins to mitigate any residual XSS risk.

Generated by OpenCVE AI on April 21, 2026 at 21:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-11832 The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.3.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
History

Fri, 27 Feb 2026 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 18 Apr 2025 08:45:00 +0000

Type Values Removed Values Added
Description The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.3.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Title Download Manager <= 3.3.12 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:28:07.516Z

Reserved: 2025-03-31T20:51:31.221Z

Link: CVE-2025-3056

cve-icon Vulnrichment

Updated: 2025-04-18T11:37:26.959Z

cve-icon NVD

Status : Deferred

Published: 2025-04-18T09:15:15.230

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-3056

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T21:30:45Z

Weaknesses