
m1.DownloadList Security & Risk Analysis
wordpress.org/plugins/m1downloadlistThis plugin easily displays the folders and files from a selected directory. It can be placed by shortcode in any post.
Is m1.DownloadList Safe to Use in 2026?
Mostly Safe
Score 77/100m1.DownloadList is generally safe to use. 2 past CVEs were resolved. Keep it updated.
The m1downloadlist plugin v0.24 exhibits a mixed security posture. On the positive side, the static analysis reveals strong coding practices in several key areas. All identified SQL queries utilize prepared statements, and all output operations are properly escaped, mitigating common injection and cross-site scripting risks. Furthermore, there are no detected dangerous functions, file operations, or external HTTP requests, and the attack surface is small with no apparent unprotected entry points like unauthenticated AJAX handlers or REST API routes. However, the plugin's vulnerability history is a significant concern. With two known CVEs, one of which remains unpatched, and both classified as medium severity, this indicates a pattern of past security weaknesses. The historical vulnerability types, Exposure of Sensitive Information and Cross-site Scripting, are particularly concerning, even if currently addressed by static analysis. The lack of nonce checks and capability checks on the single shortcode is a potential area for exploitation if the shortcode handles user-supplied input, which could lead to privilege escalation or unauthorized actions, especially given the historical XSS vulnerabilities. The absence of taint analysis results (0 flows analyzed) is also noteworthy, suggesting either a lack of complex data processing or an incomplete analysis, which could mask underlying issues.
Key Concerns
- Unpatched CVEs
- Missing nonce checks on shortcode
- Missing capability checks on shortcode
- No taint analysis performed
m1.DownloadList Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
m1.DownloadList <= 0.23 - Authenticated (Contributor+) Sensitive Information Disclosure
m1.DownloadList <= 0.19 - Authenticated (Contributor+) Stored Cross-Site Scripting
m1.DownloadList Code Analysis
Output Escaping
m1.DownloadList Attack Surface
Shortcodes 1
WordPress Hooks 1
Maintenance & Trust
m1.DownloadList Maintenance & Trust
Maintenance Signals
Community Trust
m1.DownloadList Alternatives
Zodan Authorized Downloads
z-authorized-downloads
Protect documents from unauthorized download.
File Upload Types by WPForms
file-upload-types
Easily allow WordPress to accept and upload any file type extension or MIME type, including custom file types.
Download Attachments
download-attachments
Download Attachments is a new approach to managing downloads in WordPress. It allows you to easily add and display download links in any post or page.
WP-DownloadManager
wp-downloadmanager
Adds a simple download manager to your WordPress blog.
Hotlink File Prevention
hotlink-file-prevention
Simple hotlink protection for individual files in the media library.
m1.DownloadList Developer Profile
5 plugins · 2K total installs
How We Detect m1.DownloadList
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/m1downloadlist/icons/cfile.gif/wp-content/plugins/m1downloadlist/icons/cppfile.gif/wp-content/plugins/m1downloadlist/icons/docfile.gif/wp-content/plugins/m1downloadlist/icons/exefile.gif/wp-content/plugins/m1downloadlist/icons/file.gif/wp-content/plugins/m1downloadlist/icons/folder.gif/wp-content/plugins/m1downloadlist/icons/hfile.gif/wp-content/plugins/m1downloadlist/icons/htmfile.gif+11 moreHTML / DOM Fingerprints
m1dll_subdirpathm1dll_filelistdata-m1dll-index<p class="m1dll_subdirpath"><strong>path:</strong> <a href="<strong>downloads</strong>/<a href="