Description
The Download Manager plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'reviewUserStatus' function in all versions up to, and including, 3.3.49. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve sensitive information for any user on the site including email addresses, display names, and registration dates.
Published: 2026-03-19
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Disclosure – User Email Enumeration
Action: Update Plugin
AI Analysis

Impact

The Download Manager plugin for WordPress contains a missing capability check in the reviewUserStatus function, which allows authenticated attackers with Subscriber-level access or higher to retrieve sensitive information about any site user, including email addresses, display names, and registration dates. This flaw results in a confidentiality breach and is classified under CWE-200. The impact is that attackers can harvest personally identifiable information that may be used for phishing, social engineering, or other malicious activities.

Affected Systems

The vulnerability affects all versions of the codename065 Download Manager plugin up to and including version 3.3.49. No specific sub-version or patch information is listed beyond this cutoff. Users running any earlier or equal version are potentially impacted.

Risk and Exploitability

The base CVSS score of 4.3 indicates moderate severity, driven by the limited impact of information disclosure. The EPSS score is not available, and the vulnerability is not featured in CISA’s KEV catalog. Exploitation requires the attacker to be authenticated with at least Subscriber-level privileges; no remote code execution or denial of service is possible. Given that the flaw is purely functional and does not require special conditions beyond authenticated access, the likelihood of exploitation is moderate, especially in environments with a large number of subscriber accounts.

Generated by OpenCVE AI on March 19, 2026 at 08:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the codename065 Download Manager plugin website or repository for an updated version that addresses the missing capability check.
  • Once an updated version is available, update the plugin to eliminate the vulnerability.

Generated by OpenCVE AI on March 19, 2026 at 08:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Codename065
Codename065 download Manager Plugin
Wordpress
Wordpress wordpress
Vendors & Products Codename065
Codename065 download Manager Plugin
Wordpress
Wordpress wordpress

Thu, 19 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
Description The Download Manager plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'reviewUserStatus' function in all versions up to, and including, 3.3.49. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve sensitive information for any user on the site including email addresses, display names, and registration dates.
Title Download Manager <= 3.3.49 - Missing Authorization to Authenticated (Subscriber+) User Email Enumeration via 'user' Parameter
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Codename065 Download Manager Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:25:43.856Z

Reserved: 2026-02-15T23:15:40.514Z

Link: CVE-2026-2571

cve-icon Vulnrichment

Updated: 2026-03-19T13:32:50.838Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-19T07:15:59.697

Modified: 2026-03-19T13:25:00.570

Link: CVE-2026-2571

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:15:47Z

Weaknesses