Description

The WP-DownloadManager plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.69 via the 'download_path' configuration parameter. This is due to insufficient validation of the download path setting, which allows directory traversal sequences to bypass the WP_CONTENT_DIR prefix check. This makes it possible for authenticated attackers, with Administrator-level access and above, to configure the plugin to list and access arbitrary files on the server by exploiting the file browser functionality.

INFO

Published Date :

2026-02-18T07:25:39.503Z

Last Modified :

2026-04-08T16:34:55.555Z

Source :

Wordfence
AFFECTED PRODUCTS

The following products are affected by CVE-2026-2419 vulnerability.

Vendors Products
Gamerz
  • Wp-downloadmanager
Wordpress
  • Wordpress

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact