Impact
The Download Attachments plugin for WordPress has an insecure direct object reference that permits an attacker to manipulate a user‑controlled key and bypass authorization checks, allowing the download of any file stored in the site’s upload directory, thereby exposing confidential content, a classic Authorization Bypass identified by CWE‑639.
Affected Systems
All installations of the dFactory Download Attachments plugin version 1.3.1 or earlier are affected.
Risk and Exploitability
The vulnerability has a CVSS score of 5.3, indicating moderate severity. The EPSS score of <1% suggests a very low probability of exploitation, and it is not yet listed in the CISA KEV catalog. Attackers would need to craft a malicious request containing a manipulated key and target a reachable attachment URL, with no prerequisite for elevated privileges, making the attack feasible for unauthenticated users that can access the site.
OpenCVE Enrichment
EUVD