dwnldr Security & Risk Analysis

wordpress.org/plugins/dwnldr

Sometimes there is no need for a huge, complex download manager, and let's face it there's rarely a need for an attachment page (who uses th …

10 active installs v1.031 PHP + WP 4.0+ Updated Sep 8, 2016
attachmentdownload-logdownloadshide-urlpdf
85
A · Safe
CVEs total1
Unpatched0
Last CVEJul 18, 2016
Safety Verdict

Is dwnldr Safe to Use in 2026?

Generally Safe

Score 85/100

dwnldr has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Jul 18, 2016Updated 9yr ago
Risk Assessment

The 'dwnldr' plugin v1.031 exhibits a mixed security posture. On the positive side, the static analysis reveals no apparent direct attack surface through common WordPress entry points like AJAX, REST API, shortcodes, or cron events. Furthermore, all SQL queries utilize prepared statements, indicating good database interaction practices, and there are no external HTTP requests or bundled libraries, which can sometimes introduce vulnerabilities. However, a significant concern is the complete lack of output escaping for all identified output points (9 total). This leaves the plugin highly susceptible to Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected into the website. The absence of nonce and capability checks also means that any potential vulnerabilities discovered in the future would be easier to exploit. The vulnerability history, though dated, shows a past XSS vulnerability, which aligns with the current finding of unescaped output and suggests a recurring weakness.

While the plugin currently has no unpatched CVEs and a relatively small number of total CVEs historically, the lack of output escaping is a critical flaw that significantly increases the risk of exploitation. The absence of any taint analysis results is not necessarily a strength but rather an indication that the static analysis tooling might not have detected complex data flow issues, or the plugin's code is too simple to trigger such findings. The main takeaway is the high risk associated with the unescaped output, which creates a clear pathway for XSS attacks, despite the absence of a large attack surface.

Key Concerns

  • Unescaped output for all identified outputs
  • No capability checks
  • No nonce checks
Vulnerabilities
1

dwnldr Security Vulnerabilities

CVEs by Year

1 CVE in 2016
2016
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2016-10964medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

dwnldr < 1.01 - Cross-Site Scripting

Jul 18, 2016 Patched in 1.01 (2745d)
Code Analysis
Analyzed Mar 17, 2026

dwnldr Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped9 total outputs
Attack Surface

dwnldr Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actiontemplate_redirectdwnldr.php:22
actionadmin_initdwnldr.php:24
actionadmin_initdwnldr.php:25
filtermanage_media_columnsdwnldr.php:26
actionmanage_media_custom_columndwnldr.php:27
Maintenance & Trust

dwnldr Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedSep 8, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

dwnldr Developer Profile

findshorty

2 plugins · 310 total installs

69
trust score
Avg Security Score
85/100
Avg Patch Time
2745 days
View full developer profile
Detection Fingerprints

How We Detect dwnldr

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
dwnldr_logs
FAQ

Frequently Asked Questions about dwnldr