Description
The Media Library Assistant plugin for WordPress is vulnerable to arbitrary file deletion in the /wp-content/uploads directory due to insufficient file path validation and user capability checking in the _process_mla_download_file function in all versions up to, and including, 3.27. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server from the /wp-content/uploads/ directory.
Published: 2025-08-19
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file deletion
Action: Patch
AI Analysis

Impact

The vulnerability permits authenticated users with Author-level access to delete arbitrary files from the site’s uploads directory, which could lead to loss of content and disruption of site functionality. This weakness arises from insufficient validation of the file path and a missing authorization check in the file deletion handler. The flaw is classified as CWE-862, Missing Authorization.

Affected Systems

It exists in all releases of the Media Library Assistant plugin up to and including version 3.27. The plugin is a WordPress add‑on that stores media in /wp-content/uploads, making the full set of WordPress sites that have an unaudited update vulnerable. The plugin is managed by the vendor dglingren.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate impact, while the EPSS score of less than 1% suggests exploitation is unlikely against the general population. The vulnerability is not listed in CISA’s KEV catalog. Attackers need authenticated access with Author or higher privileges, so the attack vector is internal or via compromised credentials. The lack of hard‑coded access controls in the deletion routine allows the attacker to supply a path that deletes arbitrary files in the uploads tree.

Generated by OpenCVE AI on April 21, 2026 at 03:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Media Library Assistant plugin to a version newer than 3.27, where the file path validation and capability check have been fixed.
  • If an update is not immediately possible, temporarily remove the file deletion capability from Author users or downgrade their role to Editor or lower until a patch is applied.
  • Apply file system permissions that restrict write access for the web server to the /wp-content/uploads directory, ensuring that only the plugin or privileged users can delete files.
  • Monitor logs for unexpected file removals and consider restoring deleted files from backup if a deletion occurs.

Generated by OpenCVE AI on April 21, 2026 at 03:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-28799 The Media Library Assistant plugin for WordPress is vulnerable to arbitrary file deletion in the /wp-content/uploads directory due to insufficient file path validation and user capability checking in the _process_mla_download_file function in all versions up to, and including, 3.27. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server from the /wp-content/uploads/ directory.
History

Sun, 24 Aug 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Davidlingren
Davidlingren media Library Assistant
Wordpress
Wordpress wordpress
Vendors & Products Davidlingren
Davidlingren media Library Assistant
Wordpress
Wordpress wordpress

Tue, 19 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 19 Aug 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Media Library Assistant plugin for WordPress is vulnerable to arbitrary file deletion in the /wp-content/uploads directory due to insufficient file path validation and user capability checking in the _process_mla_download_file function in all versions up to, and including, 3.27. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server from the /wp-content/uploads/ directory.
Title Media Library Assistant <= 3.27 - Authenticated (Author+) Limited File Deletion
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}


Subscriptions

Davidlingren Media Library Assistant
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:05:00.392Z

Reserved: 2025-07-30T13:56:59.477Z

Link: CVE-2025-8357

cve-icon Vulnrichment

Updated: 2025-08-19T19:21:45.415Z

cve-icon NVD

Status : Deferred

Published: 2025-08-19T05:15:30.900

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-8357

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T03:30:26Z

Weaknesses