Download After Email <= 2.1.9 - Missing Authorization
Description
The Download After Email plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in versions up to, and including, 2.1.9. This makes it possible for unauthenticated attackers to perform an unauthorized action.
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NTechnical Details
<=2.1.9What Changed in the Fix
Changes introduced in v2.1.10
Source Code
WordPress.org SVN# Research Plan: CVE-2026-24541 - Missing Authorization in Download After Email ## Vulnerability Summary The **Download After Email** plugin (versions <= 2.1.9) contains a missing authorization vulnerability in its initialization logic. Specifically, the plugin handles administrative actions—such …
Show full research plan
Research Plan: CVE-2026-24541 - Missing Authorization in Download After Email
Vulnerability Summary
The Download After Email plugin (versions <= 2.1.9) contains a missing authorization vulnerability in its initialization logic. Specifically, the plugin handles administrative actions—such as duplicating "Download" posts—within functions hooked to init or admin_init without verifying the user's capabilities or checking for a valid security nonce. This allows unauthenticated attackers to trigger these actions by sending crafted HTTP requests, leading to unauthorized data modification (e.g., mass-creating duplicate posts).
Attack Vector Analysis
- Endpoint: Any frontend or backend page that triggers the
inithook (e.g.,/,/wp-admin/admin-ajax.php). - HTTP Parameter:
dae_duplicate(GET or POST). - Authentication: None required (Unauthenticated).
- Preconditions: At least one
dae_downloadpost must exist in the database to be duplicated.
Code Flow
- Entry Point: The plugin registers a function
dae_post_types_initto theinithook inincludes/post-types.php. - Hook Registration:
add_action( 'init', 'dae_post_types_init' );(Line 9,includes/post-types.php). - Execution: When WordPress initializes,
dae_post_types_init
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.