Wicked Folders – Folder Organizer for Pages, Posts, and Custom Post…

Wicked Folders – Folder Organizer for Pages, Posts, and Custom Post…

by | Mar 14, 2026 | Plugins

Attack Vectors

CVE-2026-1883 affects the Wicked Folders – Folder Organizer for Pages, Posts, and Custom Post Types WordPress plugin (slug: wicked-folders) in versions up to and including 4.1.0. This is a Medium severity issue (CVSS 4.3; vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).

The vulnerability can be exploited by an authenticated user with Contributor-level access or higher. In practical terms, any environment where multiple internal users, contractors, or agency partners have WordPress accounts (even limited ones) is exposed to this risk.

Because the attack is performed after login and does not require user interaction, the most likely scenario is a malicious (or compromised) contributor account being used to delete folders created by other users—disrupting your editorial organization and workflows.

Reference: CVE Record for CVE-2026-1883.

Security Weakness

The issue is an Insecure Direct Object Reference (IDOR) in the plugin’s delete_folders() function, caused by missing validation on a user-controlled key. In business terms, the plugin does not sufficiently confirm that the logged-in user is actually allowed to delete the specific folder they are targeting.

This access-control gap allows a Contributor (or higher) to delete arbitrary folders created by other users, even when they should not have permission to modify or remove those items.

Remediation: Update Wicked Folders to version 4.1.1 or newer, which includes the patch. Source: Wordfence vulnerability advisory.

Technical or Business Impacts

Operational disruption: Folder deletion can break the way teams organize pages, posts, and custom post types. That can slow publishing, create confusion during campaigns, and increase time spent on content operations and QA.

Governance and workflow risk: Marketing teams often rely on folder structures to enforce internal processes (draft/review/approved), manage assets by region or business unit, and coordinate multiple stakeholders. Unauthorized folder deletion can undermine those controls and increase the likelihood of publishing mistakes.

Compliance and audit concerns: While this specific issue does not indicate data exposure (CVSS confidentiality impact is None), it can still complicate auditability and change control by enabling unauthorized destructive changes to how content is organized—especially in regulated environments where process integrity matters.

Risk management note: Because the attacker must be authenticated, prioritize reviews of who has Contributor (or higher) access, remove stale accounts, and ensure strong account security alongside the plugin update.

Similar Attacks

Access-control failures like IDORs are a common root cause of real-world incidents. Examples include:

Parler data scraping via API design weaknesses (WIRED) — a widely reported case where insufficient access controls and predictable references enabled large-scale scraping.

Peloton user data exposure tied to account/API access issues (TechCrunch) — a real-world reminder that authorization and object-level access checks are critical to prevent unauthorized actions and data access.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers