Insecure Direct Object Reference in Download Monitor Plugin for WordPress
CVE-2026-3124

7.5HIGH

Key Information:

Vendor

WordPress

Vendor
CVE Published:
30 March 2026

What is CVE-2026-3124?

The Download Monitor plugin for WordPress contains an Insecure Direct Object Reference vulnerability that can be exploited by unauthenticated attackers. This issue arises from insufficient validation in the executePayment() function, allowing attackers to utilize a user-controlled key to complete arbitrary pending orders. By manipulating the mismatch between the PayPal transaction token and the corresponding local order, attackers can potentially steal digital goods, bypassing legitimate payment requirements by paying a nominal fee for low-cost items while finalizing access to high-value orders.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Download Monitor * <= 5.1.7

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Hung Nguyen
.