Missing Authorization Vulnerability in Download After Email Plugin by WordPress
CVE-2026-24541

5.3MEDIUM

Key Information:

Vendor

WordPress

Vendor
CVE Published:
23 January 2026

What is CVE-2026-24541?

A missing authorization vulnerability exists in the Download After Email plugin for WordPress, allowing attackers to exploit incorrectly configured access control security levels. This flaw could enable unauthorized users to access sensitive functionalities, impacting the integrity and confidentiality of user data. It affects versions from n/a up to and including 2.1.9, emphasizing the need for immediate updates and configuration reviews to secure the plugin.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Download After Email <= n/a

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Nabil Irawan | Patchstack Bug Bounty Program
.