Back to CVE risk briefs

External risk intelligence

WordPress Download From Files plugin could allow external attackers to gain server control

The Download From Files plugin for WordPress could allow external attackers to upload malicious scripts, potentially compromising operational systems, customer data, and service availability. While the vulnerability is not currently being actively exploited, public exploit code exists, increasing the risk of misuse.

NVD published May 10, 2026 (2 days ago)

External risk briefCRITICAL

CVE-2021-47940

Exposure facts

Severity
CRITICAL
Published by NVD
May 10, 2026 (2 days ago)

H – Horizon Alert

A security vulnerability in the Download From Files plugin for WordPress allows unauthenticated individuals to upload files directly to the server by bypassing standard restrictions. By manipulating these file settings, an attacker could upload malicious, executable scripts onto our web environment. This creates a significant business risk, as it could grant unauthorized parties the ability to run code on our systems and compromise the integrity of our website.

A – Asset Exposure

This vulnerability affects organizations utilizing the WordPress Download From Files plugin on their websites. Since these platforms are typically internet-facing, external attackers could upload malicious scripts directly to the web server environment. Such unauthorized access could compromise your operational systems, jeopardize customer data, or disrupt overall service availability. Protecting these entry points is essential to maintaining the security and integrity of your web infrastructure.

L – Live Threat

This vulnerability presents a notable risk because publicly available exploit code currently exists, which lowers the barrier for potential misuse. This flaw allows unauthenticated individuals to upload malicious files to a web environment. However, the available context does not indicate that this vulnerability is being actively exploited or targeted in the wild at this time.

O – Operational Fix

To secure your WordPress environment, please update the Download From Files plugin to the latest available release provided by the vendor. If an update is not currently accessible, we recommend disabling or removing the plugin to prevent potential unauthorized file uploads. We also advise our security team to conduct a review of the web server to ensure no malicious files have been introduced through this component.

References