← Retour aux CVEs
CVE-2026-2571
MEDIUM4.3
Description
The Download Manager plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'reviewUserStatus' function in all versions up to, and including, 3.3.49. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve sensitive information for any user on the site including email addresses, display names, and registration dates.
Details CVE
Score CVSS v3.14.3
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie3/19/2026
Derniere modification3/19/2026
Sourcenvd
Observations honeypot0
Faiblesses (CWE)
CWE-200
References
https://plugins.trac.wordpress.org/browser/download-manager/trunk/src/User/UserController.php#L109(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/download-manager/trunk/src/User/UserController.php#L47(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/download-manager/trunk/src/User/views/review-user-status.php#L34(security@wordfence.com)
https://plugins.trac.wordpress.org/changeset/3462539/(security@wordfence.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.