The WordPress Real Media Library WordPress plugin is vulnerable to Stored Cross-Site Scripting via the name parameter in the ~/inc/overrides/lite/rest/Folder.php file which allows author-level attackers to inject arbitrary web scripts in folder names, in versions up to and including 4.14.1.

Project Subscriptions

Vendors Products
Real Media Library Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-21318 The WordPress Real Media Library WordPress plugin is vulnerable to Stored Cross-Site Scripting via the name parameter in the ~/inc/overrides/lite/rest/Folder.php file which allows author-level attackers to inject arbitrary web scripts in folder names, in versions up to and including 4.14.1.
Fixes

Solution

Update to version 4.14.2 or newer.


Workaround

No workaround given by the vendor.

History

Wed, 04 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Devowl real Media Library
CPEs cpe:2.3:a:devowl:wordpress_real_media_library:*:*:*:*:*:wordpress:*:* cpe:2.3:a:devowl:real_media_library:*:*:*:*:*:wordpress:*:*
Vendors & Products Devowl wordpress Real Media Library
Devowl real Media Library

Mon, 05 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-05-05T14:52:36.007Z

Reserved: 2021-06-10T00:00:00.000Z

Link: CVE-2021-34668

cve-icon Vulnrichment

Updated: 2024-08-04T00:19:47.930Z

cve-icon NVD

Status : Analyzed

Published: 2021-08-30T19:15:08.813

Modified: 2026-02-04T19:02:55.897

Link: CVE-2021-34668

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses