Description
Missing Authorization vulnerability in Shahjada Download Manager download-manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Download Manager: from n/a through <= 3.3.52.
Published: 2026-04-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access
Action: Immediate Patch
AI Analysis

Impact

The Download Manager plugin for WordPress contains a missing authorization check that allows visitors to access functionality normally reserved for authenticated administrators. Because the plugin does not verify user roles before permitting download or file configuration actions, an attacker can trigger privileged operations or retrieve sensitive files from the repository. The flaw is a classic broken access control (CWE‑862) and can lead to data disclosure or modification if the content is private.

Affected Systems

Affected systems are websites that have installed the Shahjada Download Manager plugin for WordPress. The issue covers all releases from the first publicly available version up to and including 3.3.52. Users who maintain older pages or rely on this plugin should verify whether they use a version below 3.3.53 and plan a migration.

Risk and Exploitability

The CVSS score is not reported in the public data, and EPSS information is unavailable, so the precise exploit probability is unclear. However, because the flaw can be triggered by unauthenticated HTTP requests and the affected plugin is widely deployed, the risk to systems is significant. The vulnerability is not listed in the CISA KEV catalog, but it remains a priority for administrators to patch or otherwise mitigate. An attacker could potentially use the flaw to harvest restricted files or alter the plugin configuration, leading to data exposure or a broader compromise.

Generated by OpenCVE AI on April 8, 2026 at 09:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Download Manager plugin to version 3.3.53 or later.
  • If an upgrade is not immediately feasible, disable the plugin or restrict write access to the download directory via server configuration.
  • Verify that the latest security patches for WordPress core are installed and that file permissions are correctly set.

Generated by OpenCVE AI on April 8, 2026 at 09:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Shahjada
Shahjada download Manager
Wordpress
Wordpress wordpress
Vendors & Products Shahjada
Shahjada download Manager
Wordpress
Wordpress wordpress
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Wed, 08 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Shahjada Download Manager download-manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Download Manager: from n/a through <= 3.3.52.
Title WordPress Download Manager plugin <= 3.3.52 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Shahjada Download Manager
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-08T17:25:16.453Z

Reserved: 2026-04-07T10:58:05.155Z

Link: CVE-2026-39676

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T09:16:39.230

Modified: 2026-04-08T21:26:13.410

Link: CVE-2026-39676

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:40:59Z

Weaknesses