Description
The WP-DownloadManager plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.69 via the 'file' parameter in the file deletion functionality. This is due to insufficient validation of user-supplied file paths, allowing directory traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can lead to remote code execution when critical files like wp-config.php are deleted.
Published: 2026-02-18
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file deletion potentially leading to remote code execution
Action: Patch
AI Analysis

Impact

The WP-DownloadManager plugin for WordPress contains a path traversal flaw in the file deletion functionality. A user can supply directory traversal sequences in the 'file' parameter, bypassing the plugin's validation. This allows an attacker with Administrator-level access to delete any file on the server, including critical files such as wp-config.php, which can result in remote code execution if the site integrities are compromised.

Affected Systems

WordPress sites running the WP-DownloadManager plugin version 1.69 or earlier from the Vendor gamerz are affected. Any installation that has not yet upgraded past this version is vulnerable.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity. The EPSS score of less than 1% suggests a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated Administrator access to the WordPress dashboard and the ability to supply a crafted file path to the deletion endpoint; there are no known publicly available exploits at this time.

Generated by OpenCVE AI on April 15, 2026 at 17:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WP-DownloadManager plugin to a version newer than 1.69.
  • Remove or restrict the delete capability for Administrator and higher roles in WordPress or within the plugin settings.
  • Enforce strict file permission controls on the web server to prevent deletion of core WordPress files and other sensitive content.

Generated by OpenCVE AI on April 15, 2026 at 17:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Gamerz
Gamerz wp-downloadmanager
Wordpress
Wordpress wordpress
Vendors & Products Gamerz
Gamerz wp-downloadmanager
Wordpress
Wordpress wordpress

Wed, 18 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
Description The WP-DownloadManager plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.69 via the 'file' parameter in the file deletion functionality. This is due to insufficient validation of user-supplied file paths, allowing directory traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can lead to remote code execution when critical files like wp-config.php are deleted.
Title WP-DownloadManager <= 1.69 - Authenticated (Administrator+) Path Traversal to Arbitrary File Deletion via 'file' Parameter
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}


Subscriptions

Gamerz Wp-downloadmanager
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:12:55.563Z

Reserved: 2026-02-12T20:44:25.814Z

Link: CVE-2026-2426

cve-icon Vulnrichment

Updated: 2026-02-18T12:24:46.293Z

cve-icon NVD

Status : Deferred

Published: 2026-02-18T11:16:32.603

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2426

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:30:10Z

Weaknesses