Insecure Direct Object Reference in Download Monitor Plugin for WordPress
CVE-2026-3124
What is CVE-2026-3124?
The Download Monitor plugin for WordPress contains an Insecure Direct Object Reference vulnerability that can be exploited by unauthenticated attackers. This issue arises from insufficient validation in the executePayment() function, allowing attackers to utilize a user-controlled key to complete arbitrary pending orders. By manipulating the mismatch between the PayPal transaction token and the corresponding local order, attackers can potentially steal digital goods, bypassing legitimate payment requirements by paying a nominal fee for low-cost items while finalizing access to high-value orders.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Download Monitor * <= 5.1.7