The Download Manager plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the savePackage function in all versions up to, and including, 3.3.12. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Metrics
Affected Vendors & Products
References
History
Mon, 21 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 19 Apr 2025 07:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Download Manager plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the savePackage function in all versions up to, and including, 3.3.12. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). | |
Title | Download Manager <= 3.3.12 - Authenticated (Author+) Arbitrary File Deletion | |
Weaknesses | CWE-22 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-04-19T07:23:39.977Z
Updated: 2025-04-21T14:11:45.109Z
Reserved: 2025-04-07T10:27:00.760Z
Link: CVE-2025-3404

Updated: 2025-04-21T14:11:30.241Z

Status : Awaiting Analysis
Published: 2025-04-19T08:15:13.780
Modified: 2025-04-21T14:23:45.950
Link: CVE-2025-3404

No data.