Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Shahjada Download Manager download-manager allows Stored XSS.This issue affects Download Manager: from n/a through <= 3.3.53.
Published: 2026-04-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑site scripting (XSS)
Action: Patch
AI Analysis

Impact

The vulnerability is a stored cross‑site scripting flaw that arises from improper neutralization of user input during web page generation. When an attacker supplies malicious script payloads through the Download Manager interface, these inputs are saved to the database and later rendered unfiltered in the front‑end. This enables the attacker to execute arbitrary JavaScript in the browsers of any user who views the affected pages, potentially leading to session hijacking, defacement, or phishing attempts. The weakness corresponds to CWE‑79. The impact is confined to client‑side execution but can be leveraged for broader attacks if the user is authenticated or privileged. The vulnerability is explicitly described as "Stored XSS", indicating persistent exposure of injected code.

Affected Systems

The affected product is the WordPress plugin "Download Manager" developed by Shahjada. Versions from the earliest release through 3.3.53 are vulnerable. Users must check whether their installation runs any of these versions; if so, they are at risk.

Risk and Exploitability

The CVSS score is not publicly provided, but the nature of a stored XSS suggests a moderate to high risk if the plugin is used in a publicly accessible site. Exploitability is straightforward: an attacker must craft input that the plugin accepts—most likely through the admin interface or upload forms—and later expose the data to unsuspecting visitors. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog, implying no confirmed widespread exploitation yet. Nonetheless, the potential for client‑side compromise makes it worth addressing promptly.

Generated by OpenCVE AI on April 8, 2026 at 09:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Download Manager to version 3.3.54 or later, the first patch that eliminates the XSS flaw.
  • Verify the upgrade by testing that the vulnerability no longer accepts and renders malicious input.
  • If an upgrade cannot be performed immediately, disable or remove the problematic plugin from the site to stop the attack surface.
  • Screen all existing content stored by the plugin for injected scripts and cleanse any dangerous entries.
  • Monitor site logs for anomalous activity that could indicate exploitation attempts.

Generated by OpenCVE AI on April 8, 2026 at 09:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Shahjada
Shahjada download Manager
Wordpress
Wordpress wordpress
Vendors & Products Shahjada
Shahjada download Manager
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Shahjada Download Manager download-manager allows Stored XSS.This issue affects Download Manager: from n/a through <= 3.3.53.
Title WordPress Download Manager plugin <= 3.3.53 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Shahjada Download Manager
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-08T08:30:24.822Z

Reserved: 2026-04-07T10:57:27.974Z

Link: CVE-2026-39615

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T09:16:31.323

Modified: 2026-04-08T21:26:35.910

Link: CVE-2026-39615

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:42:01Z

Weaknesses