CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
AI Score
Confidence
High
EPSS
Percentile
21.7%
The Media Library Folders plugin for WordPress is vulnerable to unauthorized access due to missing capability checks on several AJAX functions in the media-library-plus.php file in all versions up to, and including, 8.2.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform several actions related to managing media files and folder along with controlling settings.
Vendor | Product | Version | CPE |
---|---|---|---|
maxfoundry | media_library_folders | * | cpe:2.3:a:maxfoundry:media_library_folders:*:*:*:*:*:wordpress:*:* |
[
{
"vendor": "maxfoundry",
"product": "Media Library Folders",
"versions": [
{
"version": "*",
"status": "affected",
"lessThanOrEqual": "8.2.3",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
]
plugins.trac.wordpress.org/browser/media-library-plus/trunk/media-library-plus.php
plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3143036%40media-library-plus&new=3143036%40media-library-plus&sfp_email=&sfph_mail=
www.wordfence.com/threat-intel/vulnerabilities/id/fcc0fc00-b7d6-429c-9ab3-f08971c48777?source=cve