vulnerability
WordPress Plugin: download-after-email: CVE-2025-54743: Uncontrolled Resource Consumption
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Sep 25, 2025 | Oct 1, 2025 | Dec 19, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Sep 25, 2025
Added
Oct 1, 2025
Modified
Dec 19, 2025
Description
The Download After Email – Subscribe and Download Form Plugin plugin for WordPress is vulnerable to unauthorized repeated form submission in versions 2.1.5 to 2.1.6. This is due to the plugin not properly limiting the number of requests a user can make. This makes it possible for unauthenticated attackers to initiate a download request several times.
Solution
download-after-email-plugin-cve-2025-54743
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.