CVE-2026-4401

MEDIUM

Download Monitor <= 5.1.10 - Cross-Site Request Forgery to Download Path Deletion and Disabling

Title source: cna
STIX 2.1

Description

The Download Monitor plugin for WordPress is vulnerable to Cross-Site Request Forgery in the `actions_handler()` and `bulk_actions_handler()` methods in `class-dlm-downloads-path.php` in all versions up to, and including, 5.1.10. This is due to missing nonce verification on these functions. This makes it possible for unauthenticated attackers to delete, disable, or enable approved download paths via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Scores

CVSS v3 5.4
EPSS 0.0002
EPSS Percentile 6.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-352
Status published
Products (1)
wpchill/Download Monitor < 5.1.10
Published Apr 08, 2026
Tracked Since Apr 08, 2026