Description
The Media Library Assistant plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the mla_update_compat_fields_action() function in all versions up to, and including, 3.33. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify taxonomy terms on arbitrary attachments.
Published: 2026-03-05
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized attachment taxonomy modification
Action: Apply patch
AI Analysis

Impact

The Media Library Assistant plugin for WordPress allows an authenticated user with Subscriber-level access and above to modify taxonomy terms on any attachment due to a missing capability check in the mla_update_compat_fields_action() function. This flaw enables attackers to change how media items are categorized or tagged, potentially undermining site organization, media searchability, and the integrity of content metadata. The weakness is classified as an Authorization Bypass (CWE-862).

Affected Systems

dglingren:Media Library Assistant – the WordPress Media Library Assistant plugin. All released versions up to and including 3.33 are affected. Users running any of those versions must verify their installation and apply a fix or upgrade.

Risk and Exploitability

The reported CVSS v3 score of 4.3 reflects moderate impact with an authenticated attack vector. The EPSS score is less than 1%, indicating a very low probability of exploitation at the time of analysis, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Because the flaw requires only a standard subscriber account, the risk is chiefly that legitimate users could unintentionally or maliciously alter media taxonomy, but it does not provide a path to remote code execution or system compromise.

Generated by OpenCVE AI on April 15, 2026 at 20:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Media Library Assistant plugin to version 3.34 or later to apply the vendor‑supplied patch.
  • If updating is not immediately possible, reduce or remove the "edit_attachments" capability from Subscriber+ roles using WordPress role management or a capability‑control plugin.
  • Perform an audit of attachment taxonomy usage to identify and rectify any misconfigured or suspicious terms that might have been altered by compromised accounts.

Generated by OpenCVE AI on April 15, 2026 at 20:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Davidlingren
Davidlingren media Library Assistant
Wordpress
Wordpress wordpress
Vendors & Products Davidlingren
Davidlingren media Library Assistant
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 05:45:00 +0000

Type Values Removed Values Added
Description The Media Library Assistant plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the mla_update_compat_fields_action() function in all versions up to, and including, 3.33. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify taxonomy terms on arbitrary attachments.
Title Media Library Assistant <= 3.33 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Attachment Taxonomy Modification
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Davidlingren Media Library Assistant
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:42:42.781Z

Reserved: 2026-02-23T20:00:15.996Z

Link: CVE-2026-3072

cve-icon Vulnrichment

Updated: 2026-03-05T16:39:17.968Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:52.160

Modified: 2026-03-05T19:38:33.877

Link: CVE-2026-3072

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T20:15:13Z

Weaknesses