Description
The Download Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'redirect_to' parameter in all versions up to, and including, 3.3.46. This is due to insufficient input sanitization and output escaping on the 'redirect_to' GET parameter in the login form shortcode. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2026-02-18
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Patch Update
AI Analysis

Impact

The Download Manager plugin is vulnerable to reflected cross‑site scripting in all releases up to 3.3.46 due to the lack of sanitization and escaping of the 'redirect_to' GET parameter on the login form shortcode. An unauthenticated attacker can embed arbitrary script content that is executed when a victim opens a crafted link, enabling cookie theft, defacement, or further exploitation of the victim's session.

Affected Systems

WordPress sites running the codename065 Download Manager plugin, specifically any version 3.3.46 or older.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity, and the EPSS score of less than 1% suggests low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. The attack requires only a malicious URL and an unsuspecting user to visit it, meaning it is exploitable in a web context without authentication. While the exploitation surface is limited to a single parameter, once a victim’s browser processes the injected script the attacker gains the same privileges as the user, potentially compromising confidentiality and integrity of their session data.

Generated by OpenCVE AI on April 15, 2026 at 18:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Download Manager plugin to the latest version that removes the reflected XSS flaw.
  • If upgrading is not immediately possible, remove or disable the login form shortcode that uses the redirect_to parameter, or modify the shortcode to use WordPress’s secure redirect functions.
  • If the shortcode must remain, add input validation to explicitly allow only safe URLs for redirect_to and escape all output before rendering the page.

Generated by OpenCVE AI on April 15, 2026 at 18:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Codename065
Codename065 download Manager Plugin
Wordpress
Wordpress wordpress
Vendors & Products Codename065
Codename065 download Manager Plugin
Wordpress
Wordpress wordpress

Wed, 18 Feb 2026 07:15:00 +0000

Type Values Removed Values Added
Description The Download Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'redirect_to' parameter in all versions up to, and including, 3.3.46. This is due to insufficient input sanitization and output escaping on the 'redirect_to' GET parameter in the login form shortcode. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Download Manager <= 3.3.46 - Reflected Cross-Site Scripting via 'redirect_to' Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Codename065 Download Manager Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:47:31.489Z

Reserved: 2026-01-29T21:27:40.418Z

Link: CVE-2026-1666

cve-icon Vulnrichment

Updated: 2026-02-18T14:29:52.621Z

cve-icon NVD

Status : Deferred

Published: 2026-02-18T07:16:09.540

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1666

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T18:30:10Z

Weaknesses