CVE-2026-2426: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in gamerz WP-DownloadManager
The WP-DownloadManager plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.69 via the 'file' parameter in the file deletion functionality. This is due to insufficient validation of user-supplied file paths, allowing directory traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can lead to remote code execution when critical files like wp-config.php are deleted.
AI Analysis
Technical Summary
CVE-2026-2426 is a path traversal vulnerability classified under CWE-22 found in the WP-DownloadManager plugin for WordPress, specifically in all versions up to and including 1.69. The vulnerability arises from insufficient validation of the 'file' parameter used in the plugin's file deletion functionality. Authenticated users with Administrator-level privileges or higher can exploit this flaw by injecting directory traversal sequences (e.g., '../') into the 'file' parameter, enabling them to delete arbitrary files on the hosting server. This can include critical WordPress configuration files such as wp-config.php. The deletion of such files can disrupt site availability and potentially allow attackers to achieve remote code execution by destabilizing the WordPress environment or triggering fallback behaviors. The CVSS 3.1 base score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, high privileges required, no user interaction, and impact on integrity and availability but not confidentiality. Although no known exploits are reported in the wild, the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple administrators or less restrictive access controls. The vulnerability is particularly dangerous because it leverages legitimate administrative functionality, making detection harder. The absence of a patch at the time of publication requires organizations to implement compensating controls until an update is released.
Potential Impact
For European organizations, this vulnerability can lead to significant operational disruption and potential compromise of WordPress-based websites. Deletion of critical files like wp-config.php can cause site outages, loss of data integrity, and potentially enable attackers to execute arbitrary code remotely, leading to full system compromise. This is especially impactful for organizations relying on WordPress for e-commerce, public services, or customer-facing portals, where downtime or data loss can result in financial losses and reputational damage. The requirement for administrator-level access limits the attack surface but also means insider threats or compromised admin accounts pose a high risk. Additionally, the vulnerability could be leveraged in targeted attacks against high-value European entities, including government agencies and enterprises with sensitive data. The medium CVSS score reflects moderate ease of exploitation but significant impact on integrity and availability, which are critical for business continuity and trust.
Mitigation Recommendations
European organizations should immediately audit and restrict administrator access to the WP-DownloadManager plugin, ensuring only trusted personnel have elevated privileges. Implement strict access controls and multi-factor authentication for WordPress admin accounts to reduce the risk of credential compromise. Monitor file system integrity using tools like Tripwire or OSSEC to detect unauthorized file deletions, especially of critical files such as wp-config.php. Until an official patch is released, consider disabling or removing the WP-DownloadManager plugin if feasible, or isolate its usage to less critical environments. Employ web application firewalls (WAFs) with custom rules to detect and block directory traversal patterns in requests targeting the plugin’s file deletion endpoints. Regularly back up WordPress sites and configuration files to enable rapid recovery in case of file deletion or compromise. Stay informed on vendor updates and apply patches promptly once available. Conduct security awareness training for administrators about the risks of elevated privileges and safe plugin management.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2026-2426: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in gamerz WP-DownloadManager
Description
The WP-DownloadManager plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.69 via the 'file' parameter in the file deletion functionality. This is due to insufficient validation of user-supplied file paths, allowing directory traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can lead to remote code execution when critical files like wp-config.php are deleted.
AI-Powered Analysis
Technical Analysis
CVE-2026-2426 is a path traversal vulnerability classified under CWE-22 found in the WP-DownloadManager plugin for WordPress, specifically in all versions up to and including 1.69. The vulnerability arises from insufficient validation of the 'file' parameter used in the plugin's file deletion functionality. Authenticated users with Administrator-level privileges or higher can exploit this flaw by injecting directory traversal sequences (e.g., '../') into the 'file' parameter, enabling them to delete arbitrary files on the hosting server. This can include critical WordPress configuration files such as wp-config.php. The deletion of such files can disrupt site availability and potentially allow attackers to achieve remote code execution by destabilizing the WordPress environment or triggering fallback behaviors. The CVSS 3.1 base score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, high privileges required, no user interaction, and impact on integrity and availability but not confidentiality. Although no known exploits are reported in the wild, the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple administrators or less restrictive access controls. The vulnerability is particularly dangerous because it leverages legitimate administrative functionality, making detection harder. The absence of a patch at the time of publication requires organizations to implement compensating controls until an update is released.
Potential Impact
For European organizations, this vulnerability can lead to significant operational disruption and potential compromise of WordPress-based websites. Deletion of critical files like wp-config.php can cause site outages, loss of data integrity, and potentially enable attackers to execute arbitrary code remotely, leading to full system compromise. This is especially impactful for organizations relying on WordPress for e-commerce, public services, or customer-facing portals, where downtime or data loss can result in financial losses and reputational damage. The requirement for administrator-level access limits the attack surface but also means insider threats or compromised admin accounts pose a high risk. Additionally, the vulnerability could be leveraged in targeted attacks against high-value European entities, including government agencies and enterprises with sensitive data. The medium CVSS score reflects moderate ease of exploitation but significant impact on integrity and availability, which are critical for business continuity and trust.
Mitigation Recommendations
European organizations should immediately audit and restrict administrator access to the WP-DownloadManager plugin, ensuring only trusted personnel have elevated privileges. Implement strict access controls and multi-factor authentication for WordPress admin accounts to reduce the risk of credential compromise. Monitor file system integrity using tools like Tripwire or OSSEC to detect unauthorized file deletions, especially of critical files such as wp-config.php. Until an official patch is released, consider disabling or removing the WP-DownloadManager plugin if feasible, or isolate its usage to less critical environments. Employ web application firewalls (WAFs) with custom rules to detect and block directory traversal patterns in requests targeting the plugin’s file deletion endpoints. Regularly back up WordPress sites and configuration files to enable rapid recovery in case of file deletion or compromise. Stay informed on vendor updates and apply patches promptly once available. Conduct security awareness training for administrators about the risks of elevated privileges and safe plugin management.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-12T20:44:25.814Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699594d680d747be205fb508
Added to database: 2/18/2026, 10:30:46 AM
Last enriched: 2/18/2026, 10:44:50 AM
Last updated: 2/20/2026, 9:56:57 PM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2858: Out-of-Bounds Read in wren-lang wren
MediumCVE-2026-27120: CWE-75: Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in vapor leaf-kit
MediumCVE-2026-27118: CWE-346: Origin Validation Error in sveltejs kit
MediumCVE-2026-27112: CWE-863: Incorrect Authorization in akuity kargo
CriticalCVE-2026-27111: CWE-862: Missing Authorization in akuity kargo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.