CVE-2025-4799
📋 TL;DR
The WP-DownloadManager plugin for WordPress has a vulnerability allowing authenticated attackers with Administrator privileges to delete arbitrary files on the server. This can lead to remote code execution by deleting critical files like wp-config.php. All WordPress sites using vulnerable plugin versions are affected.
💻 Affected Systems
- WP-DownloadManager WordPress Plugin
📦 What is this software?
Wp Downloadmanager by Wp Downloadmanager Project
⚠️ Risk & Real-World Impact
Worst Case
Complete site compromise through remote code execution, data loss, and potential server takeover.
Likely Case
Site defacement, data destruction, and service disruption through deletion of critical WordPress files.
If Mitigated
Limited impact if proper access controls and file permissions are enforced.
🎯 Exploit Status
Exploitation requires authenticated Administrator access; trivial to exploit once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 1.68.10
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3294467/
Restart Required: No
Instructions:
1. Update WP-DownloadManager plugin to latest version via WordPress admin panel. 2. Verify plugin version is greater than 1.68.10. 3. Test download functionality.
🔧 Temporary Workarounds
Disable or Remove Plugin
allTemporarily disable or remove the vulnerable plugin until patching is possible.
wp plugin deactivate wp-downloadmanager
wp plugin delete wp-downloadmanager
Restrict Administrator Access
allImplement strict access controls and multi-factor authentication for Administrator accounts.
🧯 If You Can't Patch
- Implement strict file permissions (e.g., chmod 644 for wp-config.php, read-only for critical files)
- Enable WordPress security plugins with file integrity monitoring and intrusion detection
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > WP-DownloadManager version. If version ≤ 1.68.10, vulnerable.
Check Version:
wp plugin list --name=wp-downloadmanager --field=version
Verify Fix Applied:
Verify plugin version > 1.68.10 and test file deletion functionality is restricted.
📡 Detection & Monitoring
Log Indicators:
- Unusual file deletion events in WordPress logs
- Multiple failed login attempts followed by plugin file operations
Network Indicators:
- HTTP POST requests to download-options.php with file deletion parameters
SIEM Query:
source="wordpress.log" AND ("delete_file" OR "unlink" OR "wp-downloadmanager")
🔗 References
- https://plugins.trac.wordpress.org/browser/wp-downloadmanager/trunk/download-manager.php#L215
- https://plugins.trac.wordpress.org/browser/wp-downloadmanager/trunk/download-options.php#L16
- https://plugins.trac.wordpress.org/browser/wp-downloadmanager/trunk/download-options.php#L42
- https://plugins.trac.wordpress.org/changeset/3294467/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f9d9e485-171f-4e36-943d-397d540e31f4?source=cve