Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2571: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in codename065 Download Manager

0
Medium
VulnerabilityCVE-2026-2571cvecve-2026-2571cwe-200
Published: Thu Mar 19 2026 (03/19/2026, 06:46:15 UTC)
Source: CVE Database V5
Vendor/Project: codename065
Product: Download Manager

Description

CVE-2026-2571 is a medium-severity vulnerability in the codename065 Download Manager WordPress plugin, affecting all versions up to 3. 3. 49. It arises from a missing capability check in the 'reviewUserStatus' function, allowing authenticated users with Subscriber-level access or higher to access sensitive user information such as email addresses, display names, and registration dates of any user on the site. The vulnerability does not require user interaction and can be exploited remotely over the network. While it does not impact integrity or availability, it compromises confidentiality by exposing personal data. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize applying patches or workarounds once available, restrict user roles carefully, and monitor for suspicious access. Countries with significant WordPress usage and large online communities are most at risk, including the United States, Germany, United Kingdom, Canada, Australia, and India.

AI-Powered Analysis

AILast updated: 03/19/2026, 07:24:45 UTC

Technical Analysis

CVE-2026-2571 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) found in the codename065 Download Manager plugin for WordPress, affecting all versions up to and including 3.3.49. The root cause is a missing capability check in the 'reviewUserStatus' function, which fails to verify whether the requesting user has sufficient privileges before disclosing sensitive user data. This flaw allows any authenticated user with at least Subscriber-level access to retrieve sensitive information about any user on the site, including email addresses, display names, and registration dates. The vulnerability is remotely exploitable over the network without requiring user interaction. The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to the confidentiality impact and the low complexity of exploitation. The vulnerability does not affect data integrity or system availability. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The exposure of personal user information can facilitate further attacks such as phishing, social engineering, or targeted account compromise. The plugin is widely used in WordPress environments, which are popular globally, increasing the potential attack surface. The vulnerability highlights the importance of proper capability checks in plugin development to prevent unauthorized data disclosure.

Potential Impact

The primary impact of CVE-2026-2571 is the unauthorized disclosure of sensitive user information, including email addresses, display names, and registration dates. This exposure can lead to privacy violations and enable attackers to conduct targeted phishing campaigns, social engineering attacks, or identity theft. Although the vulnerability does not directly compromise system integrity or availability, the leakage of personal data can undermine user trust and violate data protection regulations such as GDPR or CCPA, potentially resulting in legal and financial repercussions for affected organizations. Since exploitation requires only Subscriber-level access, attackers can leverage compromised or low-privilege accounts to escalate their information gathering. Organizations with large user bases or sensitive user data are particularly at risk. The absence of known exploits in the wild reduces immediate threat but does not eliminate the risk of future exploitation. Overall, the vulnerability poses a moderate risk to confidentiality and privacy, with potential cascading effects on organizational reputation and compliance.

Mitigation Recommendations

1. Immediately restrict user roles and permissions to the minimum necessary, especially limiting Subscriber-level accounts from untrusted users. 2. Monitor and audit user activity logs for unusual access patterns to user data, focusing on calls to functions related to 'reviewUserStatus'. 3. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the vulnerable function or plugin endpoints. 4. If possible, disable or remove the Download Manager plugin until a security patch is released. 5. Follow the plugin vendor’s updates closely and apply official patches as soon as they become available. 6. Consider custom patching or code review to add capability checks on the 'reviewUserStatus' function to ensure only authorized roles can access sensitive information. 7. Educate site administrators and users about the risks of phishing and social engineering that may arise from leaked user data. 8. Regularly back up website data and configurations to enable quick recovery if exploitation leads to further compromise. 9. Employ security plugins that can detect and alert on unauthorized data access attempts within WordPress environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-15T23:15:40.514Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bba122e32a4fbe5f9bab70

Added to database: 3/19/2026, 7:09:22 AM

Last enriched: 3/19/2026, 7:24:45 AM

Last updated: 3/19/2026, 8:11:26 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses