Description
Cross-Site Request Forgery (CSRF) vulnerability in M.Code Media Library Downloader media-library-downloader allows Cross Site Request Forgery.This issue affects Media Library Downloader: from n/a through <= 1.4.0.
Published: 2025-12-09
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a Cross‑Site Request Forgery (CSRF) flaw in the WordPress Media Library Downloader plugin version 1.4.0 and earlier. It allows attackers to trick a logged‑in user into triggering unauthorized actions against the site’s media library. The flaw originates from the absence of a CSRF token or proper verification, enabling an attacker to force the victim to perform actions without consent.

Affected Systems

All WordPress sites running the Media Library Downloader plugin, known as M.Code, with version 1.4.0 or earlier are affected.

Risk and Exploitability

Based on the description, it is inferred that an attacker must first convince a logged‑in user to visit a malicious page that submits a request to the plugin’s endpoint. The exploit requires user interaction, which gives it a low probability of success, as reflected by an EPSS score of less than 1%. The CVSS score of 4.3 indicates moderate severity with potential confidentiality and integrity impact. The vulnerability is not listed in the CISA KEV catalog, implying no widespread exploitation has been documented at this time.

Generated by OpenCVE AI on April 29, 2026 at 19:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Media Library Downloader plugin to any newer version that addresses the CSRF flaw.
  • If an update cannot be performed immediately, consider disabling the plugin’s administrative endpoints or restricting access to trusted administrators.
  • Deploy a web application firewall or security plugin that filters suspicious CSRF requests and requires WordPress nonces for media‑library operations.

Generated by OpenCVE AI on April 29, 2026 at 19:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Michael Revellin-Clerc Media Library Downloader media-library-downloader allows Cross Site Request Forgery.This issue affects Media Library Downloader: from n/a through <= 1.4.0. Cross-Site Request Forgery (CSRF) vulnerability in M.Code Media Library Downloader media-library-downloader allows Cross Site Request Forgery.This issue affects Media Library Downloader: from n/a through <= 1.4.0.

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Wed, 10 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 09 Dec 2025 15:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Michael Revellin-Clerc Media Library Downloader media-library-downloader allows Cross Site Request Forgery.This issue affects Media Library Downloader: from n/a through <= 1.4.0.
Title WordPress Media Library Downloader plugin <= 1.4.0 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:54:51.970Z

Reserved: 2025-10-21T14:59:44.293Z

Link: CVE-2025-62734

cve-icon Vulnrichment

Updated: 2025-12-10T22:06:52.553Z

cve-icon NVD

Status : Deferred

Published: 2025-12-09T16:18:02.087

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-62734

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T19:30:18Z

Weaknesses