Description
The WP-DownloadManager plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.69 via the 'download_path' configuration parameter. This is due to insufficient validation of the download path setting, which allows directory traversal sequences to bypass the WP_CONTENT_DIR prefix check. This makes it possible for authenticated attackers, with Administrator-level access and above, to configure the plugin to list and access arbitrary files on the server by exploiting the file browser functionality.
References (4)
Core 4
Core References
Product
https://plugins.trac.wordpress.org/browser/wp-downloadmanager/tags/1.69/download-options.php#L42
Product
https://plugins.trac.wordpress.org/browser/wp-downloadmanager/trunk/download-options.php#L42
Scores
CVSS v3
2.7
EPSS
0.0002
EPSS Percentile
5.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (1)
gamerz/WP-DownloadManager
< 1.69
Published
Feb 18, 2026
Tracked Since
Feb 18, 2026