Impact
The FileBird WordPress plugin suffers from missing authorization checks in versions up to 6.5.1. A user‑controlled key is validated in the ConvertController::insertToNewTable function, allowing an authenticated author or higher to inject global folders and reassign media attachments. This flaw, classified as CWE‑862, undermines the integrity of the media library by permitting unauthorized modification and potential concealment of content.
Affected Systems
The vulnerability affects the ninjateam FileBird – WordPress Media Library Folders & File Manager plugin for all releases up to and including 6.5.1. No specific patch level information is supplied beyond the endpoint version range.
Risk and Exploitability
The CVSS score of 4.3 reflects a moderate impact, and the EPSS score is below 1%, indicating a low probability of exploitation. The issue is not listed in CISA KEV. Attacks require authenticated access with author‑level or higher privileges within the same WordPress installation, and the attacker can manipulate folder assignments to compromise media organization.
OpenCVE Enrichment