Impact
The Media Library Folders plugin contains a missing capability check on several AJAX actions, which allows an authenticated user with Author level or higher to modify plugin settings, including IP‑blocking rules. By changing these settings, the attacker can alter how visitor requests are handled, potentially weakening site security or making the site more vulnerable to other attacks. The primary impact is configuration tampering, leading to degraded security controls and increased attack surface.
Affected Systems
This vulnerability affects the MaxFoundry Media Library Folders plugin for WordPress, specifically all releases up to and including version 8.3.0. Users running any of these versions are susceptible to the described authorization bypass.
Risk and Exploitability
The CVSS score of 4.3 indicates a low severity issue, and the EPSS score of less than 1% suggests a very low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attacker must be authenticated with at least Author privileges and must trigger the vulnerable AJAX actions; no additional privilege escalation is required. While the risk is moderate due to the low likelihood, the potential for configuration manipulation warrants timely remediation.
OpenCVE Enrichment
EUVD