Impact
The Download Monitor plugin contains a cross‑site request forgery flaw in the actions_handler() and bulk_actions_handler() methods due to missing nonce verification. An attacker can forge a request that causes an authenticated administrator to delete, disable, or re‑enable approved download paths, effectively removing or exposing downloadable content.
Affected Systems
This vulnerability affects the WordPress plugin Download Monitor from vendor wpchill. All releases up to and including version 5.1.10 are impacted; later releases contain the fix.
Risk and Exploitability
The CVSS base score of 5.4 indicates moderate severity. Exploitation requires the attacker to entice an authenticated site administrator to click a crafted link or submit a form, so user interaction is necessary. No EPSS score is available and the entry is not listed in the CISA KEV catalog, suggesting that while exploitation is possible, it would require an active phishing or social engineering campaign targeting administrators.
OpenCVE Enrichment