CVE-2025-15364

WordPress · WordPress Download Manager Plugin

A high-severity vulnerability has been identified in the Download Manager plugin for WordPress, which could allow an attacker to take over user accounts, including those with administrative privileges.

Executive summary

A high-severity vulnerability has been identified in the Download Manager plugin for WordPress, which could allow an attacker to take over user accounts, including those with administrative privileges. Successful exploitation could lead to a complete compromise of the affected website, resulting in data theft, website defacement, and further attacks launched from the compromised system. Organizations using this plugin are urged to apply the recommended updates immediately to mitigate the significant risk of unauthorized access and control.

Vulnerability

The vulnerability allows for privilege escalation through an account takeover mechanism. An unauthenticated attacker can exploit a flaw in how the plugin handles user data modification requests. By crafting a specific HTTP request to a vulnerable endpoint, the attacker can change the email address or password associated with an existing user's account without proper authorization, effectively locking the legitimate user out and granting the attacker full access to that account. If the targeted account is an administrator, this results in a complete compromise of the WordPress site.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.3. A successful exploit could have a severe impact on business operations. An attacker gaining administrative control of a website can access, modify, or delete all content; steal sensitive user data including Personally Identifiable Information (PII); install malware or backdoors for persistent access; and use the compromised website to host phishing campaigns or attack other systems. Such an incident can lead to significant reputational damage, loss of customer trust, regulatory fines, and financial losses associated with incident response and recovery.

Remediation

Immediate Action:

  • Immediately update the Download Manager plugin to the latest patched version (greater than version 3.0) as recommended by the vendor.
  • Before updating the production site, test the update in a staging environment to ensure compatibility and functionality.
  • If the plugin is not critical to business operations, the principle of least functionality should be applied: deactivate and uninstall the plugin to completely remove the attack surface.

Proactive Monitoring:

  • Review WordPress audit logs for any unauthorized or unexpected changes to user accounts, particularly password resets or email address modifications.
  • Monitor for the creation of new, unauthorized administrator-level accounts.
  • Analyze web server access logs for unusual requests to plugin-specific endpoints, which could indicate scanning or exploitation attempts.

Compensating Controls:

  • If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with virtual patching rules designed to block exploit attempts targeting this specific vulnerability.
  • Enforce mandatory Multi-Factor Authentication (MFA) for all users, especially administrators. This provides a critical additional layer of security that can prevent an account takeover even if credentials are changed.
  • Restrict access to the WordPress administrative dashboard (/wp-admin/) to trusted IP addresses only.

Exploitation status

Public Exploit Available: true

Analyst recommendation

Given the high severity of this vulnerability (CVSS 7.3) and the confirmed availability of a public exploit, we strongly recommend that organizations treat this as a critical priority. The risk of complete website compromise is high. All instances of the vulnerable Download Manager plugin should be updated to a patched version immediately. If patching is delayed for any reason, compensating controls such as a WAF and mandatory MFA must be implemented without delay to reduce the risk of exploitation.