CVE-2026-2426

Source
https://cve.org/CVERecord?id=CVE-2026-2426
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2426.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-2426
Published
2026-02-18T11:16:32.603Z
Modified
2026-02-20T02:14:56.664548Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
Summary
[none]
Details

The WP-DownloadManager plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.69 via the 'file' parameter in the file deletion functionality. This is due to insufficient validation of user-supplied file paths, allowing directory traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can lead to remote code execution when critical files like wp-config.php are deleted.

References

Affected packages

Git / github.com/lesterchan/wp-downloadmanager

Affected ranges

Type
GIT
Repo
https://github.com/lesterchan/wp-downloadmanager
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2426.json"