Media Library Folders Vulnerability (Medium) – CVE-2026-2312

Media Library Folders Vulnerability (Medium) – CVE-2026-2312

by | Feb 14, 2026 | Plugins

Attack Vectors

The WordPress plugin Media Library Folders (slug: media-library-plus) is affected by a Medium-severity issue (CVE-2026-2312, CVSS 4.3). The vulnerability can be triggered over the network by an authenticated user with Author-level access or higher, without requiring additional user interaction.

In practical terms, this means a user who can log in as an Author (or a compromised Author account) may be able to target media items they do not own and perform destructive actions. This is especially relevant for organizations where multiple teams, agencies, or contractors share the same WordPress instance and roles are distributed across departments.

Security Weakness

This issue is an Insecure Direct Object Reference (IDOR) in Media Library Folders affecting versions up to and including 8.3.6. According to the published advisory, missing validation on a user-controlled key in the plugin’s attachment deletion and rename functionality allows an authenticated Author+ user to delete or rename attachments owned by other users, including administrators.

The rename workflow has an added risk: it deletes all postmeta for the targeted attachment, which can create lasting data loss beyond just the filename change. That postmeta may include information used by themes, page builders, SEO tooling, and compliance workflows.

Technical or Business Impacts

Brand and campaign disruption: Unauthorized deletion or renaming of media can break landing pages, product pages, blog posts, and paid campaign destinations—leading to lost conversions, diminished brand trust, and emergency fixes during active campaigns.

Content integrity and governance risk: When Authors can modify or remove attachments owned by other teams (including administrators), it undermines editorial controls and approval processes. This can complicate accountability across Marketing, Compliance, and leadership stakeholders.

Data loss and operational overhead: Because the rename flow also removes all attachment postmeta, organizations may face unexpected loss of structured information tied to assets (for example, data used for reporting, accessibility workflows, or asset management), requiring time-consuming reconstruction and increasing the chance of persistent site inconsistencies.

Recommended action: Update Media Library Folders to 8.3.7 or newer (patched). In parallel, review which users have Author-level (or higher) access, and confirm that media governance policies match how many internal and external users can log in.

Reference: CVE-2026-2312 and the advisory from Wordfence Threat Intelligence.

Similar Attacks

IDOR and broken access control issues are among the most common ways attackers abuse legitimate application features to access or alter assets they should not control. For additional context on real-world incidents and how organizations address these risks, see:

OWASP Top 10: Broken Access Control
Equifax 2017 breach overview (official site)
FTC: Equifax settlement announcement

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers