CVE-2026-39616
Download Attachments <= 1.4.0 - Unauthenticated Insecure Direct Object Reference
mediumAuthorization Bypass Through User-Controlled Key
6.5
CVSS Score
6.5
CVSS Score
medium
Severity
Unpatched
Patched in
N/A
Time to patch
Description
The Download Attachments plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.4.0 due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to perform unauthorized actions.
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:LAttack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Low
Confidentiality
None
Integrity
Low
Availability
Technical Details
Affected versions
<=1.4.0PublishedFebruary 10, 2026
Last updatedMay 5, 2026
Affected plugindownload-attachments
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.