Description
Unrestricted Upload of File with Dangerous Type vulnerability in halfdata Green Downloads halfdata-paypal-green-downloads allows Using Malicious Files.This issue affects Green Downloads: from n/a through <= 2.08.
Published: 2026-03-25
Score: 9.9 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Upload with potential code execution
Action: Immediate Patch
AI Analysis

Impact

This vulnerability allows an attacker to upload any type of file through the Green Downloads plugin on WordPress sites without validating MIME type or file extension. Because the plugin stores the uploaded files on the server, a malicious actor could place executable code or otherwise dangerous content that, once accessed, could compromise the site. The weakness is identified as CWE‑434, which represents an Input Validation vulnerability that permits the upload of dangerous files.

Affected Systems

WordPress installations that have the halfdata Green Downloads plugin version 2.08 or earlier are affected. The upload functionality of the plugin can be reached by users who have the necessary privileges in the WordPress administration interface, providing a path for an attacker to place files on the server.

Risk and Exploitability

The CVSS base score of 9.9 categorizes this flaw as critical. Although no EPSS value is available, the high severity score and the fact that the vulnerability exists in a widely used WordPress plugin suggest that exploitation is likely. The vulnerability is not listed in the CISA KEV catalog, but this does not reduce the inherent risk. Based on the description, it is inferred that the attack vector is remote exploitation through the plugin's file upload interface, which can be accessed by authenticated users with sufficient privileges.

Generated by OpenCVE AI on March 26, 2026 at 01:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest release of the Green Downloads plugin (any version newer than 2.08) to eliminate the arbitrary file upload flaw.
  • If an update cannot be applied immediately, disable or remove the upload capability from the plugin or uninstall the plugin entirely to eliminate the attack vector.
  • Configure the server or the plugin to limit accepted file extensions to safe types such as jpg or png and reject executable files.
  • Implement a web application firewall rule or adjust server configuration to block uploads of disallowed extensions.
  • Monitor upload logs for suspicious activity and maintain alerts for unauthorized file additions.

Generated by OpenCVE AI on March 26, 2026 at 01:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Halfdata
Halfdata stripe Green Downloads
Wordpress
Wordpress wordpress
Vendors & Products Halfdata
Halfdata stripe Green Downloads
Wordpress
Wordpress wordpress

Wed, 25 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in halfdata Green Downloads halfdata-paypal-green-downloads allows Using Malicious Files.This issue affects Green Downloads: from n/a through <= 2.08.
Title WordPress Green Downloads plugin <= 2.08 - Arbitrary File Upload vulnerability
Weaknesses CWE-434
References

Subscriptions

Halfdata Stripe Green Downloads
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-03-25T20:20:42.466Z

Reserved: 2026-03-12T11:12:24.777Z

Link: CVE-2026-32536

cve-icon Vulnrichment

Updated: 2026-03-25T20:19:18.283Z

cve-icon NVD

Status : Received

Published: 2026-03-25T17:17:07.293

Modified: 2026-03-25T21:16:45.867

Link: CVE-2026-32536

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:12:17Z

Weaknesses