CVE-2026-1666: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codename065 Download Manager
The Download Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'redirect_to' parameter in all versions up to, and including, 3.3.46. This is due to insufficient input sanitization and output escaping on the 'redirect_to' GET parameter in the login form shortcode. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2026-1666 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the codename065 Download Manager plugin for WordPress, affecting all versions up to and including 3.3.46. The vulnerability stems from improper neutralization of input during web page generation, specifically due to insufficient sanitization and output escaping of the 'redirect_to' GET parameter used in the login form shortcode. Because this parameter is directly reflected in the page output without adequate filtering, an attacker can craft a malicious URL containing JavaScript payloads. When a user clicks such a link, the injected script executes in the context of the victim's browser, potentially leading to session hijacking, credential theft, or redirection to malicious sites. The attack does not require any authentication but does require user interaction (clicking the malicious link). The vulnerability has a CVSS 3.1 score of 6.1, indicating medium severity with a network attack vector, low attack complexity, no privileges required, but user interaction is necessary. The scope is changed (S:C) because the vulnerability affects resources beyond the vulnerable component, such as user sessions or other site data. Currently, there are no known exploits in the wild, but the presence of this vulnerability in a widely used WordPress plugin poses a significant risk. The plugin is commonly used to manage downloadable content on WordPress sites, which are prevalent across many sectors. The vulnerability is categorized under CWE-79, which covers improper neutralization of input leading to XSS. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for interim mitigations.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of user sessions and data. Exploitation could allow attackers to hijack user sessions, steal credentials, or perform phishing attacks by injecting malicious scripts into login forms. This is particularly concerning for organizations relying on WordPress sites with public-facing login forms, such as e-commerce platforms, government portals, and service providers. The reflected XSS can also facilitate further attacks like malware distribution or unauthorized actions performed on behalf of users. While availability is not directly impacted, the reputational damage and potential regulatory consequences under GDPR for data breaches could be significant. Organizations with high volumes of user interactions on affected sites are at greater risk. The medium CVSS score reflects the need for timely mitigation to prevent exploitation, especially since no authentication is required and the attack surface is broad due to the network vector. The absence of known exploits in the wild reduces immediate urgency but does not eliminate the threat, as attackers often develop exploits rapidly after disclosure.
Mitigation Recommendations
1. Monitor the codename065 plugin repository and official channels for a security patch and apply it immediately upon release. 2. Until a patch is available, implement manual input validation and output escaping on the 'redirect_to' parameter within the plugin code or via web application firewall (WAF) rules to block or sanitize malicious payloads. 3. Employ a robust WAF with specific rules to detect and block reflected XSS attempts targeting the 'redirect_to' parameter. 4. Educate users and administrators to be cautious about clicking on suspicious links, especially those that include unusual URL parameters. 5. Conduct regular security audits and penetration tests focusing on input validation and output encoding in WordPress plugins. 6. Consider temporarily disabling or restricting access to the login form shortcode that uses the vulnerable parameter if feasible. 7. Implement Content Security Policy (CSP) headers to reduce the impact of XSS by restricting script execution sources. 8. Maintain up-to-date backups and incident response plans to quickly recover in case of compromise. 9. Review and tighten user session management to detect and prevent session hijacking attempts. 10. For organizations with high-risk profiles, consider isolating critical WordPress instances or using reverse proxies to add additional security layers.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-1666: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codename065 Download Manager
Description
The Download Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'redirect_to' parameter in all versions up to, and including, 3.3.46. This is due to insufficient input sanitization and output escaping on the 'redirect_to' GET parameter in the login form shortcode. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2026-1666 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the codename065 Download Manager plugin for WordPress, affecting all versions up to and including 3.3.46. The vulnerability stems from improper neutralization of input during web page generation, specifically due to insufficient sanitization and output escaping of the 'redirect_to' GET parameter used in the login form shortcode. Because this parameter is directly reflected in the page output without adequate filtering, an attacker can craft a malicious URL containing JavaScript payloads. When a user clicks such a link, the injected script executes in the context of the victim's browser, potentially leading to session hijacking, credential theft, or redirection to malicious sites. The attack does not require any authentication but does require user interaction (clicking the malicious link). The vulnerability has a CVSS 3.1 score of 6.1, indicating medium severity with a network attack vector, low attack complexity, no privileges required, but user interaction is necessary. The scope is changed (S:C) because the vulnerability affects resources beyond the vulnerable component, such as user sessions or other site data. Currently, there are no known exploits in the wild, but the presence of this vulnerability in a widely used WordPress plugin poses a significant risk. The plugin is commonly used to manage downloadable content on WordPress sites, which are prevalent across many sectors. The vulnerability is categorized under CWE-79, which covers improper neutralization of input leading to XSS. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for interim mitigations.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of user sessions and data. Exploitation could allow attackers to hijack user sessions, steal credentials, or perform phishing attacks by injecting malicious scripts into login forms. This is particularly concerning for organizations relying on WordPress sites with public-facing login forms, such as e-commerce platforms, government portals, and service providers. The reflected XSS can also facilitate further attacks like malware distribution or unauthorized actions performed on behalf of users. While availability is not directly impacted, the reputational damage and potential regulatory consequences under GDPR for data breaches could be significant. Organizations with high volumes of user interactions on affected sites are at greater risk. The medium CVSS score reflects the need for timely mitigation to prevent exploitation, especially since no authentication is required and the attack surface is broad due to the network vector. The absence of known exploits in the wild reduces immediate urgency but does not eliminate the threat, as attackers often develop exploits rapidly after disclosure.
Mitigation Recommendations
1. Monitor the codename065 plugin repository and official channels for a security patch and apply it immediately upon release. 2. Until a patch is available, implement manual input validation and output escaping on the 'redirect_to' parameter within the plugin code or via web application firewall (WAF) rules to block or sanitize malicious payloads. 3. Employ a robust WAF with specific rules to detect and block reflected XSS attempts targeting the 'redirect_to' parameter. 4. Educate users and administrators to be cautious about clicking on suspicious links, especially those that include unusual URL parameters. 5. Conduct regular security audits and penetration tests focusing on input validation and output encoding in WordPress plugins. 6. Consider temporarily disabling or restricting access to the login form shortcode that uses the vulnerable parameter if feasible. 7. Implement Content Security Policy (CSP) headers to reduce the impact of XSS by restricting script execution sources. 8. Maintain up-to-date backups and incident response plans to quickly recover in case of compromise. 9. Review and tighten user session management to detect and prevent session hijacking attempts. 10. For organizations with high-risk profiles, consider isolating critical WordPress instances or using reverse proxies to add additional security layers.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-29T21:27:40.418Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6995672780d747be204d292c
Added to database: 2/18/2026, 7:15:51 AM
Last enriched: 2/18/2026, 7:32:04 AM
Last updated: 2/21/2026, 2:19:17 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.