๐Ÿ” CVE Alert

CVE-2026-24541

MEDIUM 5.3

WordPress Download After Email plugin <= 2.1.9 - Broken Access Control vulnerability

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

Missing Authorization vulnerability in mkscripts Download After Email download-after-email allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Download After Email: from n/a through <= 2.1.9.

CWE CWE-862
Vendor mkscripts
Product download after email
Published Jan 23, 2026
Last Updated Apr 1, 2026
Stay Ahead of the Next One

Get instant alerts for mkscripts download after email

Be the first to know when new medium vulnerabilities affecting mkscripts download after email are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

mkscripts / Download After Email
0 โ‰ค 2.1.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
patchstack.com: https://patchstack.com/database/Wordpress/Plugin/download-after-email/vulnerability/wordpress-download-after-email-plugin-2-1-9-broken-access-control-vulnerability?_s_id=cve

Credits

Nabil Irawan | Patchstack Bug Bounty Program