Plugin Vulnerability Hub
Plugin 3 known issues Latest disclosed Mar 27, 2017

filedownload Vulnerabilities

Review known vulnerability records for the WordPress plugin filedownload (`filedownload`), including severity, CVE references, affected versions, and patch status.

Recent tracked CVEs on this page include CVE-2015-1000002, CVE-2015-1000003 and CVE-2015-1000004, so operators can jump from disclosure to patch validation without scanning the full feed first.

Known Records
3
High or Critical
2
Patch Coverage
100%
Last Updated
Aug 15, 2024
Priority CVE Quick Links

Fast paths into filedownload CVE reports

Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.

Indexed CVEs
3
Coverage Snapshot

What this page helps you verify fast

This hub clusters every indexed record for filedownload so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
3 records include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
1 critical and 1 high severity finding.
Recent CVEs
CVE-2015-1000002, CVE-2015-1000003 and CVE-2015-1000004
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Known Vulnerabilities

Reports for filedownload

Sorted by latest disclosure date so newly published issues surface first.

Plugin High Patched: Yes CVE-2015-1000002
CVE-2015-1000002: File Download <= 1.4 - Open Proxy

The File Download plugin for WordPress has an Open Proxy vulnerability via the 'path' parameter in versions up to, and including, 1.4.

Published
Mar 27, 2017
Patched Release
2.0
Affected Versions
Versions up to 1.4
Next Step
Update to 2.0 or newer if supported.
Plugin Critical Patched: Yes CVE-2015-1000003
CVE-2015-1000003: filedownload < 1.4 - Blind SQL Injection

The filedownload plugin for WordPress is vulnerable to blind SQL Injection in versions before 1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for attackers to append additional SQ...

Published
Jul 11, 2015
Patched Release
1.4
Affected Versions
Versions before 1.4
Next Step
Update to 1.4 or newer if supported.
Plugin Medium Patched: Yes CVE-2015-1000004
CVE-2015-1000004: filedownload plugin <= 1.4 - Cross-Site Scripting

The filedownload plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 1.4 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser.

Published
Jul 11, 2015
Patched Release
2.0
Affected Versions
Versions up to 1.4
Next Step
Update to 2.0 or newer if supported.