Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Anatoly Download Counter download-counter allows Path Traversal.This issue affects Download Counter: from n/a through <= 1.4.
Published: 2025-11-06
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Download Counter plugin for WordPress contains an Improper Limitation of a Pathname to a Restricted Directory flaw (CWE‑22). A victim who visits a specially crafted URL can trigger the plugin’s download handler to read and download any file the web server can access. Based on the description, it is inferred that an attacker can exfiltrate sensitive configuration files, passwords, or other confidential data, satisfying a high confidentiality impact. The CVSS score of 7.5 indicates a moderate‑to‑high severity, while the EPSS score of < 1 % signals a low but non‑zero likelihood of exploitation.

Affected Systems

This issue affects all installations of the WordPress Download Counter plugin version 1.4 and earlier, authored by Anatoly. No further sub‑revision information is provided, so any deployment of the affected plugin family is considered at risk.

Risk and Exploitability

Because the vulnerability is triggered by constructing a malicious request to the plugin’s download endpoint, it can be abused with remote access to the WordPress site without requiring privilege escalation. The attack vector is most likely remote web-based. The EPSS score of < 1 % indicates a low exploitation probability, and the vulnerability is not listed in CISA KEV. Nevertheless, the high CVSS rating warrants prompt mitigation.

Generated by OpenCVE AI on April 30, 2026 at 05:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Download Counter plugin to version 1.5 or later, or remove it if the feature is no longer required.
  • Apply any vendor‑issued patch that enforces strict path normalization before serving downloads.
  • If an update cannot be applied immediately, block the plugin’s download endpoint through web‑server configuration or restricted folder settings to prevent arbitrary file access.

Generated by OpenCVE AI on April 30, 2026 at 05:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 17 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Fri, 07 Nov 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Anatoly Download Counter download-counter allows Path Traversal.This issue affects Download Counter: from n/a through <= 1.4.
Title WordPress Download Counter plugin <= 1.4 - Arbitrary File Download vulnerability
Weaknesses CWE-22
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:58.787Z

Reserved: 2025-09-25T15:34:44.964Z

Link: CVE-2025-60242

cve-icon Vulnrichment

Updated: 2025-11-17T14:37:24.717Z

cve-icon NVD

Status : Deferred

Published: 2025-11-06T16:16:06.917

Modified: 2026-04-27T16:16:34.203

Link: CVE-2025-60242

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T05:15:28Z

Weaknesses