[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fd1Nw6pJuTlLouEwjiRXnDgqyf46tCrAZp3RVMvDLcn8":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2025-54743","download-after-email-unauthorized-repeated-form-submissions","Download After Email  2.1.5 - 2.1.6 - Unauthorized Repeated Form Submissions","The Download After Email – Subscribe & Download Form Plugin plugin for WordPress is vulnerable to unauthorized repeated form submission in versions 2.1.5 to 2.1.6. This is due to the plugin not properly limiting the number of requests a user can make. This makes it possible for unauthenticated attackers to initiate a download request several times.","download-after-email",null,">=2.1.5 \u003C=2.1.6","2.1.7","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Uncontrolled Resource Consumption","2025-09-25 00:00:00","2025-09-30 12:35:56",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F7663359c-259e-4d74-8e62-ef4adda3a693?source=api-prod",6]