Description
The Download Manager plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the savePackage function in all versions up to, and including, 3.3.12. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Published: 2025-04-19
Score: 8.8 High
EPSS: 2.0% Low
KEV: No
Impact: Arbitrary File Deletion with potential Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The Download Manager plugin permits authenticated users with Author-level or higher privileges to remove any file from the server due to inadequate file path validation in the savePackage routine. An attacker can target critical files such as wp-config.php, enabling remote code execution or complete site compromise. The flaw is a classic Path Traversal issue, classified as CWE-22, and grants destructive capabilities that surpass typical author functions.

Affected Systems

WordPress sites running the codename065 Download Manager plugin version 3.3.12 or earlier are affected. This includes the Up to 3.3.12 releases distributed through the official repository and any custom installations that have not been updated to a newer, corrected version.

Risk and Exploitability

The CVSS score of 8.8 signals a high severity, while an EPSS score of 2% indicates that exploitation is unlikely but possible. Because the vulnerability requires authenticated access at the author level, threat actors must first compromise or impersonate a legitimate user before deleting files. The flaw is not currently listed in the CISA KEV catalog, but the potential for remote code execution makes it highly critical for organizations that rely on this plugin.

Generated by OpenCVE AI on April 28, 2026 at 02:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Download Manager plugin to the newest release that resolves the path validation flaw.
  • If an update cannot be applied immediately, revoke Author-level (and higher) roles from users or restrict access to the savePackage endpoint to prevent unauthorized deletions.
  • Ensure that file system permissions for WordPress directories grant write access only to the necessary areas, minimizing the impact of any unintended delete operations.

Generated by OpenCVE AI on April 28, 2026 at 02:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-15051 The Download Manager plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the savePackage function in all versions up to, and including, 3.3.12. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
History

Mon, 21 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 19 Apr 2025 07:30:00 +0000

Type Values Removed Values Added
Description The Download Manager plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the savePackage function in all versions up to, and including, 3.3.12. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Title Download Manager <= 3.3.12 - Authenticated (Author+) Arbitrary File Deletion
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:41:32.877Z

Reserved: 2025-04-07T10:27:00.760Z

Link: CVE-2025-3404

cve-icon Vulnrichment

Updated: 2025-04-21T14:11:30.241Z

cve-icon NVD

Status : Deferred

Published: 2025-04-19T08:15:13.780

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-3404

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T02:15:18Z

Weaknesses