CVE-2025-3404: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in codename065 Download Manager
The Download Manager plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the savePackage function in all versions up to, and including, 3.3.12. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
AI Analysis
Technical Summary
CVE-2025-3404 is a path traversal vulnerability affecting the Download Manager plugin for WordPress developed by codename065. This vulnerability exists in all versions up to and including 3.3.12 due to insufficient validation of file paths in the savePackage function. Specifically, the plugin fails to properly restrict pathname inputs, allowing an authenticated attacker with Author-level privileges or higher to manipulate file paths and delete arbitrary files on the server. This improper limitation of pathname (CWE-22) can be exploited to remove critical files such as wp-config.php, which contains database credentials and other sensitive configuration data. Deletion of such files can lead to remote code execution (RCE) by enabling attackers to upload malicious files or disrupt normal WordPress operations, potentially allowing full server compromise. The vulnerability requires authentication at the Author level, which is a moderately privileged role in WordPress, making exploitation feasible in environments where user accounts are not tightly controlled. Although no public exploits have been reported yet, the vulnerability's nature and impact make it a significant risk for WordPress sites using this plugin. The lack of a patch at the time of reporting further increases exposure. The vulnerability affects the confidentiality, integrity, and availability of the affected systems by enabling unauthorized file deletions and potential server takeover.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those relying on WordPress websites with the Download Manager plugin installed. Successful exploitation can lead to data breaches through exposure of sensitive configuration files, service disruption by deleting essential files, and full system compromise via remote code execution. Organizations in sectors such as e-commerce, government, healthcare, and finance, which often use WordPress for public-facing websites or internal portals, could face operational downtime, reputational damage, and regulatory penalties under GDPR if personal data is compromised. The requirement for Author-level access means insider threats or compromised user accounts could be leveraged to exploit this vulnerability. Additionally, the lack of a patch means organizations must rely on mitigation strategies until an official fix is released. The impact is amplified for organizations with large WordPress deployments or those with less stringent user access controls.
Mitigation Recommendations
1. Immediately audit user roles and permissions within WordPress to ensure that only trusted users have Author-level or higher access. Remove or downgrade unnecessary privileged accounts. 2. Implement strict monitoring and logging of file deletion activities on the server to detect suspicious behavior early. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the Download Manager plugin endpoints. 4. Restrict file system permissions for the web server user to limit the ability to delete or modify critical files such as wp-config.php. 5. Temporarily disable or uninstall the Download Manager plugin if it is not essential, or replace it with alternative plugins that do not have this vulnerability. 6. Regularly back up website files and databases to enable rapid restoration in case of file deletion or compromise. 7. Stay alert for official patches or updates from codename065 and apply them promptly once available. 8. Conduct internal security awareness training emphasizing the risks of privilege misuse and the importance of strong authentication controls.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-3404: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in codename065 Download Manager
Description
The Download Manager plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the savePackage function in all versions up to, and including, 3.3.12. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
AI-Powered Analysis
Technical Analysis
CVE-2025-3404 is a path traversal vulnerability affecting the Download Manager plugin for WordPress developed by codename065. This vulnerability exists in all versions up to and including 3.3.12 due to insufficient validation of file paths in the savePackage function. Specifically, the plugin fails to properly restrict pathname inputs, allowing an authenticated attacker with Author-level privileges or higher to manipulate file paths and delete arbitrary files on the server. This improper limitation of pathname (CWE-22) can be exploited to remove critical files such as wp-config.php, which contains database credentials and other sensitive configuration data. Deletion of such files can lead to remote code execution (RCE) by enabling attackers to upload malicious files or disrupt normal WordPress operations, potentially allowing full server compromise. The vulnerability requires authentication at the Author level, which is a moderately privileged role in WordPress, making exploitation feasible in environments where user accounts are not tightly controlled. Although no public exploits have been reported yet, the vulnerability's nature and impact make it a significant risk for WordPress sites using this plugin. The lack of a patch at the time of reporting further increases exposure. The vulnerability affects the confidentiality, integrity, and availability of the affected systems by enabling unauthorized file deletions and potential server takeover.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those relying on WordPress websites with the Download Manager plugin installed. Successful exploitation can lead to data breaches through exposure of sensitive configuration files, service disruption by deleting essential files, and full system compromise via remote code execution. Organizations in sectors such as e-commerce, government, healthcare, and finance, which often use WordPress for public-facing websites or internal portals, could face operational downtime, reputational damage, and regulatory penalties under GDPR if personal data is compromised. The requirement for Author-level access means insider threats or compromised user accounts could be leveraged to exploit this vulnerability. Additionally, the lack of a patch means organizations must rely on mitigation strategies until an official fix is released. The impact is amplified for organizations with large WordPress deployments or those with less stringent user access controls.
Mitigation Recommendations
1. Immediately audit user roles and permissions within WordPress to ensure that only trusted users have Author-level or higher access. Remove or downgrade unnecessary privileged accounts. 2. Implement strict monitoring and logging of file deletion activities on the server to detect suspicious behavior early. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the Download Manager plugin endpoints. 4. Restrict file system permissions for the web server user to limit the ability to delete or modify critical files such as wp-config.php. 5. Temporarily disable or uninstall the Download Manager plugin if it is not essential, or replace it with alternative plugins that do not have this vulnerability. 6. Regularly back up website files and databases to enable rapid restoration in case of file deletion or compromise. 7. Stay alert for official patches or updates from codename065 and apply them promptly once available. 8. Conduct internal security awareness training emphasizing the risks of privilege misuse and the importance of strong authentication controls.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-04-07T10:27:00.760Z
- Cisa Enriched
- true
Threat ID: 682d984bc4522896dcbf7e9b
Added to database: 5/21/2025, 9:09:31 AM
Last enriched: 6/20/2025, 2:05:35 PM
Last updated: 8/18/2025, 11:28:43 PM
Views: 12
Related Threats
CVE-2025-38742: CWE-732: Incorrect Permission Assignment for Critical Resource in Dell iDRAC Service Module (iSM)
MediumCVE-2025-38743: CWE-805: Buffer Access with Incorrect Length Value in Dell iDRAC Service Module (iSM)
HighCVE-2025-52351: n/a
HighCVE-2025-52352: n/a
HighCVE-2025-7051: CWE-284 in N-able N-central
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.