Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13498: CWE-862 Missing Authorization in codename065 Download Manager

0
Medium
VulnerabilityCVE-2025-13498cvecve-2025-13498cwe-862
Published: Thu Dec 18 2025 (12/18/2025, 07:20:46 UTC)
Source: CVE Database V5
Vendor/Project: codename065
Product: Download Manager

Description

The Download Manager plugin for WordPress is vulnerable to unauthorized access of sensitive information in all versions up to, and including, 3.3.32. This is due to missing authorization and capability checks on the `wpdm_media_access` AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve passwords and access control settings for protected media attachments, which can then be used to bypass the intended media protection and download restricted files.

AI-Powered Analysis

AILast updated: 12/18/2025, 10:00:06 UTC

Technical Analysis

CVE-2025-13498 is a vulnerability identified in the Download Manager plugin developed by codename065 for WordPress, affecting all versions up to and including 3.3.32. The core issue is a missing authorization and capability check on the AJAX action named wpdm_media_access. This flaw allows any authenticated user with at least Subscriber-level privileges to invoke this AJAX endpoint and retrieve sensitive information, specifically passwords and access control settings related to protected media attachments. These credentials and settings can then be leveraged to bypass the intended media protection mechanisms, enabling unauthorized downloads of restricted files. The vulnerability is classified under CWE-862 (Missing Authorization) and has a CVSS 3.1 base score of 4.3, indicating a medium severity level. The attack vector is network-based (remote), requires low attack complexity, and only requires privileges equivalent to a Subscriber role, which is a low-level authenticated user in WordPress. No user interaction is needed for exploitation, and the impact is primarily on confidentiality, with no direct integrity or availability effects. No patches or fixes were listed at the time of disclosure, and no known exploits have been reported in the wild. The vulnerability highlights the importance of proper authorization checks on AJAX endpoints in WordPress plugins, especially those handling sensitive media content.

Potential Impact

For European organizations, this vulnerability poses a significant confidentiality risk, especially for those relying on the Download Manager plugin to protect sensitive or proprietary media content. Unauthorized access to passwords and access control settings could lead to data leakage, intellectual property theft, or exposure of confidential documents. This risk is heightened for organizations with multiple users having Subscriber-level access, such as large enterprises, educational institutions, or media companies using WordPress as a content management system. Although the vulnerability does not affect system integrity or availability directly, the breach of confidentiality could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations if personal data is exposed), and potential financial losses. The ease of exploitation from low-privilege accounts increases the threat surface, especially in environments where user account management is lax or where many users have Subscriber roles. The lack of known exploits in the wild suggests limited immediate threat but also underscores the need for proactive mitigation before attackers develop exploit code.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability. First, restrict Subscriber-level user capabilities by auditing and minimizing the number of users with such access, ensuring only trusted individuals hold these roles. Implement strict user access controls and monitor for unusual AJAX requests to the wpdm_media_access endpoint. If possible, temporarily disable or restrict the Download Manager plugin until a security patch is released. Employ Web Application Firewalls (WAFs) with custom rules to block unauthorized AJAX calls targeting this endpoint. Regularly review WordPress plugin updates and apply patches promptly once available from codename065. Additionally, consider implementing multi-factor authentication (MFA) for all WordPress accounts to reduce the risk of compromised credentials. Conduct security awareness training for administrators and users about the risks of privilege escalation and unauthorized access. Finally, perform regular security audits and vulnerability scans focusing on WordPress plugins and their access controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-21T01:04:54.935Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6943b0354eb3efac366fee2b

Added to database: 12/18/2025, 7:41:41 AM

Last enriched: 12/18/2025, 10:00:06 AM

Last updated: 12/19/2025, 4:06:41 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats