Description
Authorization Bypass Through User-Controlled Key vulnerability in dFactory Download Attachments download-attachments allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Download Attachments: from n/a through <= 1.4.0.
Published: 2026-04-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Authorization Bypass
Action: Patch
AI Analysis

Impact

An IDOR flaw exists in the dFactory Download Attachments plugin for WordPress that permits an attacker to manipulate a user‑controlled key, bypassing the intended access control and retrieving any attachment the website owner has stored. The vulnerability stems from improperly enforced security levels, allowing read access to resources that should be restricted to authorized users only. This creates a severe threat to confidentiality, because an unauthenticated or low‑privileged user can obtain private files, and it compromises integrity if the attacker can replace or tamper with attachments. The primary impact is an authorization bypass with potentially widespread access across the site.

Affected Systems

WordPress sites that use the dFactory Download Attachments plugin, versions up to and including 1.4.0. The problem exists in all installable releases where the plugin is present, as the code path is not guarded by proper role checks. Users should identify whether they run any version in the affected range and note that any installation of the plugin before 1.4.1 is vulnerable.

Risk and Exploitability

The CVSS score is not supplied, but the defect allows direct access to user data via a direct object reference, indicating high severity. EPSS information is unavailable, and the vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed widespread exploitation yet. However, attackers can exploit this weakness using crafted URLs or parameters, which typically requires only knowledge of the site structure and is feasible over an exposed network. The absence of advanced authentication checks means that the attack does not need elevated privileges, making the risk significant for any site with public or limited user access.

Generated by OpenCVE AI on April 8, 2026 at 09:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the dFactory Download Attachments plugin to the latest version (currently 1.4.1 or newer).
  • If an update is not immediately possible, restrict direct object access by disabling or hard‑coding the direct attachment URLs, ensuring that only authenticated users can refer to them.
  • Apply the principle of least privilege to the WordPress installation, ensuring that the minimum necessary roles can access the plugin’s functionalities.

Generated by OpenCVE AI on April 8, 2026 at 09:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Dfactory
Dfactory download Attachments
Wordpress
Wordpress wordpress
Vendors & Products Dfactory
Dfactory download Attachments
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description Authorization Bypass Through User-Controlled Key vulnerability in dFactory Download Attachments download-attachments allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Download Attachments: from n/a through <= 1.4.0.
Title WordPress Download Attachments plugin <= 1.4.0 - Insecure Direct Object References (IDOR) vulnerability
Weaknesses CWE-639
References

Subscriptions

Dfactory Download Attachments
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-08T08:30:25.169Z

Reserved: 2026-04-07T10:57:27.974Z

Link: CVE-2026-39616

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T09:16:31.460

Modified: 2026-04-08T21:26:35.910

Link: CVE-2026-39616

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:42:00Z

Weaknesses