CVE-2026-24541

5.3 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in the WordPress Download After Email plugin that allows unauthorized users to bypass access controls and download protected files. It affects all WordPress sites using the plugin version 2.1.9 or earlier. The vulnerability stems from improper access control configuration that fails to verify user permissions.

💻 Affected Systems

Products:
  • WordPress Download After Email plugin
Versions: n/a through <= 2.1.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations using vulnerable plugin versions regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could download sensitive files intended only for authenticated users, potentially exposing confidential documents, media, or proprietary content.

🟠

Likely Case

Attackers bypassing download restrictions to access gated content without proper authorization, violating intended access controls.

🟢

If Mitigated

Proper authorization checks prevent unauthorized access, maintaining intended download restrictions.

🌐 Internet-Facing: HIGH - WordPress plugins are typically internet-facing, making them directly accessible to attackers.
🏢 Internal Only: LOW - This is primarily an internet-facing WordPress plugin vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Missing authorization vulnerabilities typically require minimal technical skill to exploit once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2.1.9

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/download-after-email/vulnerability/wordpress-download-after-email-plugin-2-1-9-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Download After Email' plugin. 4. Click 'Update Now' if available. 5. If no update available, deactivate and delete the plugin, then install the latest version from WordPress repository.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched version is available

wp plugin deactivate download-after-email

Access Restriction via .htaccess

linux

Restrict access to plugin directories at web server level

# Add to .htaccess in wp-content/plugins/download-after-email/
Order Deny,Allow
Deny from all

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block unauthorized access attempts to download endpoints
  • Monitor access logs for unusual download patterns from unauthenticated users

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Download After Email version <= 2.1.9

Check Version:

wp plugin get download-after-email --field=version

Verify Fix Applied:

Verify plugin version is > 2.1.9 in WordPress admin panel and test download functionality with unauthorized user

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to download endpoints
  • Multiple failed authorization checks in plugin logs
  • Downloads from IPs not associated with authenticated users

Network Indicators:

  • HTTP requests to download-after-email endpoints without proper authentication headers
  • Unusual download patterns from single IP addresses

SIEM Query:

source="wordpress.log" AND "download-after-email" AND ("unauthorized" OR "access denied")

🔗 References

📤 Share & Export