Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in CreativeMindsSolutions CM Download Manager cm-download-manager allows Path Traversal.This issue affects CM Download Manager: from n/a through <= 2.9.6.
Published: 2025-04-01
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An attacker can delete any file on the WordPress site by exploiting a path traversal flaw in the CM Download Manager plugin. The weakness allows the malicious user to craft a URL that bypasses the intentional directory bounds, resulting in the removal of arbitrary files. This type of bypass violates the principle of restricted file access and can lead to loss of critical content, configuration files, or code that could further compromise the system.

Affected Systems

WordPress sites that have the CreativeMindsSolutions CM Download Manager plugin installed at version 2.9.6 or earlier. The vulnerability covers all releases described as "from n/a through <= 2.9.6".

Risk and Exploitability

The CVSS score of 8.6 indicates high severity, yet the EPSS score is below 1%, suggesting a very low probability of exploitation currently. The vulnerability is not listed in the CISA KEV catalog, so there is no documented large‑scale exploitation as of the last update. The attack vector is inferred to be remote via HTTP requests, as text analysis shows the flaw is triggered by URL manipulation within the web application. All conditions for exploitation revolve around having network access to the WordPress instance and administrative or file‑write permissions on the server.

Generated by OpenCVE AI on May 1, 2026 at 02:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the CM Download Manager plugin to a version newer than 2.9.6, which removes the path traversal flaw.
  • If an immediate upgrade is not feasible, disable the plugin entirely or restrict its access to trusted users only to prevent exploitation.
  • Ensure that filesystem permissions are set to the minimum required for normal operation, preventing ordinary users and processes from deleting critical WordPress files.

Generated by OpenCVE AI on May 1, 2026 at 02:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-9077 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in CreativeMindsSolutions CM Download Manager allows Path Traversal. This issue affects CM Download Manager: from n/a through 2.9.6.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in CreativeMindsSolutions CM Download Manager allows Path Traversal. This issue affects CM Download Manager: from n/a through 2.9.6. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in CreativeMindsSolutions CM Download Manager cm-download-manager allows Path Traversal.This issue affects CM Download Manager: from n/a through <= 2.9.6.
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Tue, 01 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 01 Apr 2025 05:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in CreativeMindsSolutions CM Download Manager allows Path Traversal. This issue affects CM Download Manager: from n/a through 2.9.6.
Title WordPress CM Download Manager plugin <= 2.9.6 - Arbitrary File Deletion vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:00.353Z

Reserved: 2025-03-26T09:21:38.618Z

Link: CVE-2025-30910

cve-icon Vulnrichment

Updated: 2025-04-01T15:49:26.789Z

cve-icon NVD

Status : Deferred

Published: 2025-04-01T06:15:54.707

Modified: 2026-04-23T15:27:18.573

Link: CVE-2025-30910

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T02:45:06Z

Weaknesses