Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 18 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Codename065
Codename065 download Manager Plugin Wordpress Wordpress wordpress |
|
| Vendors & Products |
Codename065
Codename065 download Manager Plugin Wordpress Wordpress wordpress |
Wed, 18 Feb 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Download Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'redirect_to' parameter in all versions up to, and including, 3.3.46. This is due to insufficient input sanitization and output escaping on the 'redirect_to' GET parameter in the login form shortcode. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | |
| Title | Download Manager <= 3.3.46 - Reflected Cross-Site Scripting via 'redirect_to' Parameter | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-02-18T14:29:56.775Z
Reserved: 2026-01-29T21:27:40.418Z
Link: CVE-2026-1666
Updated: 2026-02-18T14:29:52.621Z
Status : Received
Published: 2026-02-18T07:16:09.540
Modified: 2026-02-18T07:16:09.540
Link: CVE-2026-1666
No data.
OpenCVE Enrichment
Updated: 2026-02-18T10:32:39Z