Description
The FileBird – WordPress Media Library Folders & File Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the /filebird/v1/fb-wipe-clear-all-data function in all versions up to, and including, 6.4.9. This makes it possible for authenticated attackers, with author-level access and above, to reset all of the plugin's configuration data.
Published: 2025-10-18
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized configuration reset
Action: Apply patch
AI Analysis

Impact

The FileBird WordPress Media Library plugin contains a missing capability check on the REST endpoint /filebird/v1/fb-wipe-clear-all-data. An authenticated user with author or higher privileges can invoke this endpoint to wipe and reset all plugin configuration data, effectively erasing the organization of media folders and settings. This is an unauthorized modification flaw, classified as CWE-285, that compromises integrity of plugin data but does not grant arbitrary code execution or direct visibility of sensitive site content.

Affected Systems

Any WordPress installation using FileBird version 6.4.9 or earlier, provided users have author role or higher permissions in the site. The vulnerability affects the FileBird – WordPress Media Library Folders & File Manager plugin from ninjateam.

Risk and Exploitability

The vulnerability scores a CVSS of 4.3, indicating a medium impact. The EPSS score of less than 1% suggests that exploit attempts are relatively rare. It is not listed in CISA KEV catalogs. The attack requires authenticated author-level access to the site, making it a local privilege escalation within the WordPress administrative context. Due to the low exploitation probability but moderate severity, organizations should consider mitigations promptly.

Generated by OpenCVE AI on April 22, 2026 at 12:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade FileBird to version 6.5.0 or later, when the missing capability check has been corrected.
  • If an immediate upgrade is not possible, block or restrict access to the /filebird/v1/fb-wipe-clear-all-data REST endpoint using an application firewall rule or a security plugin that prevents execution of unverified endpoints.
  • Review role definitions in WordPress and remove or limit the ability of author or higher roles to access plugin configuration pages.

Generated by OpenCVE AI on April 22, 2026 at 12:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Oct 2025 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Ninjateam
Ninjateam filebird
Wordpress
Wordpress wordpress
Vendors & Products Ninjateam
Ninjateam filebird
Wordpress
Wordpress wordpress

Sat, 18 Oct 2025 07:00:00 +0000

Type Values Removed Values Added
Description The FileBird – WordPress Media Library Folders & File Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the /filebird/v1/fb-wipe-clear-all-data function in all versions up to, and including, 6.4.9. This makes it possible for authenticated attackers, with author-level access and above, to reset all of the plugin's configuration data.
Title FileBird <= 6.4.9 - Improper Authorization to Authenticated (Author+) Settings Reset
Weaknesses CWE-285
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Ninjateam Filebird
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:56:42.001Z

Reserved: 2025-10-08T15:06:17.946Z

Link: CVE-2025-11510

cve-icon Vulnrichment

Updated: 2025-10-20T19:01:59.047Z

cve-icon NVD

Status : Deferred

Published: 2025-10-18T07:15:35.190

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11510

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T12:45:17Z

Weaknesses