vulnerability

WordPress Plugin: download-after-email: CVE-2025-54743: Uncontrolled Resource Consumption

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Sep 25, 2025
Added
Oct 1, 2025
Modified
Dec 19, 2025

Description

The Download After Email – Subscribe and Download Form Plugin plugin for WordPress is vulnerable to unauthorized repeated form submission in versions 2.1.5 to 2.1.6. This is due to the plugin not properly limiting the number of requests a user can make. This makes it possible for unauthenticated attackers to initiate a download request several times.

Solution

download-after-email-plugin-cve-2025-54743
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.