Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-15051 | The Download Manager plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the savePackage function in all versions up to, and including, 3.3.12. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). |
Mon, 21 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 19 Apr 2025 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Download Manager plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the savePackage function in all versions up to, and including, 3.3.12. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). | |
| Title | Download Manager <= 3.3.12 - Authenticated (Author+) Arbitrary File Deletion | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:41:32.877Z
Reserved: 2025-04-07T10:27:00.760Z
Link: CVE-2025-3404
Updated: 2025-04-21T14:11:30.241Z
Status : Deferred
Published: 2025-04-19T08:15:13.780
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-3404
No data.
OpenCVE Enrichment
Updated: 2026-04-28T02:15:18Z
EUVD