
Download Manager Security & Risk Analysis
wordpress.org/plugins/download-managerThis File Management & Digital Store plugin will help you to control file downloads & sell digital products from your WP site.
Is Download Manager Safe to Use in 2026?
Mostly Safe
Score 76/100Download Manager is generally safe to use. 79 past CVEs were resolved.
The "download-manager" plugin v3.3.51 presents a concerning security posture, primarily due to a significant attack surface with a high proportion of unprotected entry points. With 31 out of 81 total entry points lacking authentication checks, this plugin is highly susceptible to unauthorized access and execution of potentially malicious actions. The static analysis also reveals that a substantial percentage of output operations (61%) are not properly escaped, indicating a strong potential for Cross-Site Scripting (XSS) vulnerabilities, especially when combined with the number of unprotected AJAX handlers and REST API routes.
Taint analysis, while limited in scope (18 flows analyzed), did identify one high-severity flow. This, coupled with the history of 74 known CVEs, including critical and high-severity issues across various categories like Path Traversal, Code Injection, and Authentication Bypass, paints a worrying picture. The historical prevalence of these serious vulnerability types suggests a pattern of insecure coding practices within the plugin. While there are currently no unpatched CVEs, the sheer volume and nature of past vulnerabilities indicate a persistent risk.
Despite the presence of numerous file operations and external HTTP requests which can be sources of vulnerabilities if not handled correctly, the absence of dangerous functions and the use of prepared statements for a good portion of SQL queries are positive signs. However, these strengths are heavily outweighed by the significant attack surface lacking proper authorization and the historical trend of severe security flaws. The plugin's security is compromised by a lack of robust access control and output sanitization, demanding immediate attention and mitigation.
Key Concerns
- High number of unprotected AJAX handlers
- High number of unprotected REST API routes
- High percentage of unescaped output
- High severity taint flow identified
- Significant number of past critical CVEs
- Significant number of past high CVEs
- Vulnerability history shows Path Traversal issues
- Vulnerability history shows Code Injection issues
- Vulnerability history shows Auth Bypass issues
- Vulnerability history shows Improper Access Control issues
Download Manager Security Vulnerabilities
CVEs by Year
Severity Breakdown
79 total CVEs
Download Manager <= 3.3.51 - Missing Authorization to Authenticated (Contributor+) Media File Protection Removal
Download Manager <= 3.3.52 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes
Download Manager <= 3.3.49 - Missing Authorization to Authenticated (Subscriber+) User Email Enumeration via 'user' Parameter
Download Manager <= 3.3.52 - Missing Authorization
Download Manager <= 3.3.46 - Reflected Cross-Site Scripting via 'redirect_to' Parameter
Download Manager <= 3.3.53 - Authenticated (Author+) Stored Cross-Site Scripting
Download Manager <= 3.3.40 - Unauthenticated Limited Privilege Escalation via updatePassword
Download Manager <= 3.3.32 - Missing Authorization to Authenticated (Subscriber+) Media Attachment Password Disclosure
Download Manager <= 3.3.30 - Unauthenticated Cron Trigger due to Hardcoded Cron Key
Download Manager <= 3.3.32 - Authenticated (Subscriber+) Information Exposure
Download Manager <= 3.3.25 - Unauthenticated Sensitive Information Exposure
Download Manager <= 3.3.24 - Cross-Site Request Forgery
Download Manager <= 3.3.23 - Reflected Cross-Site Scripting via `user_ids` Parameter
Download Manager <= 3.3.18 - Authenticated (Author+) Stored Cross-site Scripting via wpdm_user_dashboard Shortcode
Download Manager <= 3.3.12 - Authenticated (Author+) Arbitrary File Deletion
Download Manager <= 3.3.12 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload
Download Manager <= 3.3.08 - Authenticated (Author+) Path Traversal to Limited File Overwrite
Download Manager <= 3.3.06 - Unauthenticated Information Disclosure via Unprotected Directory
Download Manager <= 3.3.03 - Missing Authorization
Download Manager <= 3.3.03 - Unauthenticated Arbitrary Shortcode Execution
Download manager <= 3.3.03 - Improper Authorization to Unauthenticated Download of Password-Protected Files
Download Manager <= 3.3.02 - Authenticated (Admin+) Stored Cross-Site Scripting
Download Manager <= 3.2.99 - Authenticated (Contributor+) Stored Cross-Site Scripting
Download Manager <= 3.2.98 - Authenticated (Admin+) Stored Cross-Site Scripting
Download Manager <= 3.2.97 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Download Manager <= 3.2.89 - Improper Authorization via protectMediaLibrary
Download Manager <= 3.2.92 - Authenticated (Author+) Stored Cross-Site Scripting via Multiple Shortcodes
Download Manager <= 3.2.86 - Authenticated (Subscriber+) Stored Self-Based Cross-Site Scripting
Download Manager <= 3.2.93 - Authenticated (Contributor+) Stored Cross-Site Scripting via wpdm_modal_login_form Shortcode
Download Manager <= 3.2.90 - Authenticated (Contributor+) Stored Cross-Site Scripting via wpdm-all-packages Shortcode
Download Manager <= 3.2.84 - Authenticated (Contributor+) Stored Cross-Site Scripting
Download Manager <= 3.2.85 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Download Manager <= 3.2.84 - Missing Authorization
Download Manager <= 3.2.82 - Unauthenticated Password Leak
Download Manager <= 3.2.70 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Download Manager <= 3.2.70 - Insufficient Authorization to Information Disclosure
Download Manager Pro <= 6.2.9 - Unauthenticated Information Disclosure
Download Manager <= 3.2.61 - Authenticated (Contributor+) Stored Cross-Site Scripting
Download Manager <= 3.2.59 - Refleced Cross-Site Scripting
Download Manager <= 3.2.54 - Authenticated (Admin+) Path Traversal
Download Manager <= 3.2.49 - Authenticated (Contributor+) PHAR Deserialization
Download Manager <= 3.2.53 - Reflected Cross-Site Scripting
Download Manager <= 3.2.48 - Cross-Site Request Forgery to Plugin Settings Update
Download Manager <= 3.2.48 - Cross-Site Request Forgery
Download Manager <= 3.2.49 - IP Blocking Bypass
Download Manager <= 3.2.50 - Authenticated (Contributor+) Arbitrary File Deletion
Download Manager <= 3.2.48 - Authenticated (Contributor+) Stored Cross-Site Scripting
Download Manager <= 3.2.43 - Reflected Cross-Site Scripting
Download Manager <= 3.2.43 - Reflected Cross-Site Scripting
Download Manager <= 3.2.46 - Contributor+ Cross-Site Scripting
Download Manager <= 3.2.42 - Reflected Cross-Site Scripting
Download Manager <= 3.2.38 - Unauthenticated Brute Force of File Master Key
Download Manager <= 3.2.34 - Sensitive Information Disclosure
WordPress Download Manager <= 3.2.33 - Authenticated SQL Injection
WordPress Download Manager <= 3.2.21 - Cross-Site Scripting
WordPress Download Manager <= 3.2.15 - Cross-Site Scripting
WordPress Download Manager <= 3.2.12 - Cross-Site Request Forgery
WordPress Download Manager <= 3.1.24 - Authenticated File Upload
WordPress Download Manager <= 3.1.24 - Cross-Site Scripting
WordPress Download Manager < 3.1.22 - Cross-Site Request Forgery
WordPress Download Manager < 3.1.23 - Arbitrary Asset Manager Usage
WordPress Download Manager < 3.1.19 - Arbitrary File Upload
Download Manager <= 3.1.17 - Missing Authorization
WordPress Download Manager <= 2.9.96 - Cross-Site Scripting
WordPress Download Manager <= 2.9.93 - Cross-Site Scripting
WordPress Download Manager <= 2.9.6 - Cross-Site Request Forgery
WordPress Download Manager < 2.9.51 - Open Redirect
WordPress Download Manager <= 2.9.51 - Cross-Site Scripting
WordPress Download Manager <= 2.9.49 - Reflected Cross-Site Scripting
WordPress Download Manager <= 2.9.45 - Cross-Site Request Forgery
Download Manager <= 2.8.7 - Sensitive Information Disclosure via Directory Listing
Download Manager <= 2.8.7 - Privilege Escalation
Download Manager <= 2.8.7 - Missing Authorization
WordPress Download Manager <= 2.7.94 - Stored Cross-Site Scripting
WordPress Download Manager <= 2.7.4 - Remote Code Execution
WordPress Download Manager <= 2.7.2 - Authenticated Arbitrary Options Update
Download Manager <= 2.2.2 - Cross-Site Scripting
Download Manager < 2.5.9 - Stored Cross-Site Scripting
Download Manager <= 2.5.8 - Cross-Site Scripting
Download Manager Release Timeline
Download Manager Code Analysis
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
Download Manager Attack Surface
AJAX Handlers 52
REST API Routes 5
Shortcodes 24
WordPress Hooks 103
Scheduled Events 2
Maintenance & Trust
Download Manager Maintenance & Trust
Maintenance Signals
Community Trust
Download Manager Alternatives
Download Monitor – Migrate download counts
download-monitor-migrate-download-counts
Migrate DLM download counts.
Comdev Downloads
comdev-downloads
Comdev Downloads is a powerful plugin for uploading, managing, and tracking download packages, as well as displaying download links.
Download Monitor
download-monitor
Powerful Download Manager Plugin for WordPress
Download Manager Addons for Elementor
wpdm-elementor
Download Manager Addons for Elementor
Download Monitor – CORS
download-monitor-cors
Download Monitor is a plugin for selling, uploading and managing downloads, tracking downloads and displaying links.
Download Manager Developer Profile
6 plugins · 116K total installs
How We Detect Download Manager
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/download-manager/assets/css/frontend.css/wp-content/plugins/download-manager/assets/css/bootstrap-grid.min.css/wp-content/plugins/download-manager/assets/css/fontawesome.min.css/wp-content/plugins/download-manager/assets/js/wpdm-front.js/wp-content/plugins/download-manager/assets/js/axios.min.js/wp-content/plugins/download-manager/assets/js/sweetalert.min.js/wp-content/plugins/download-manager/assets/js/wpdm-script.js/wp-content/plugins/download-manager/assets/js/wpdm-vue.js/wp-content/plugins/download-manager/assets/js/wpdm-front.js/wp-content/plugins/download-manager/assets/js/axios.min.js/wp-content/plugins/download-manager/assets/js/sweetalert.min.js/wp-content/plugins/download-manager/assets/js/wpdm-script.js/wp-content/plugins/download-manager/assets/js/wpdm-vue.jsdownload-manager/assets/css/frontend.css?ver=download-manager/assets/css/bootstrap-grid.min.css?ver=download-manager/assets/css/fontawesome.min.css?ver=download-manager/assets/js/wpdm-front.js?ver=download-manager/assets/js/axios.min.js?ver=download-manager/assets/js/sweetalert.min.js?ver=download-manager/assets/js/wpdm-script.js?ver=download-manager/assets/js/wpdm-vue.js?ver=HTML / DOM Fingerprints
wpdm-category-listwpdm-package-listwpdm-download-linkwpdm-social-buttonswpdm-login-formwpdm-user-dashboardwpdm-access-noticewpdm-nav-menu+2 moredata-package-iddata-templatedata-actiondata-redirect-urldata-show-logindata-show-signupWPDMwpdm_frontend_datawpdm_modal_settingsWPDM_API/wp-json/wpdm/v1/packages/wp-json/wpdm/v1/categories/wp-json/wpdm/v1/download/wp-json/wpdm/v1/user[wpdm_packages[wpdm_categories[wpdm_download_link[wpdm_login_form