CVE-2025-12038
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-01

Last updated on: 2025-11-04

Assigner: Wordfence

Description
The Folderly plugin for WordPress is vulnerable to unauthorized modification of data due to an insufficient capability check on the /wp-json/folderly/v1/config/clear-all-data REST API endpoint in all versions up to, and including, 0.3. This makes it possible for authenticated attackers, with Author-level access and above, to clear all data like terms and categories.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-01
Last Modified
2025-11-04
Generated
2026-05-07
AI Q&A
2025-11-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
folderly folderly *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Folderly WordPress plugin allows authenticated users with Author-level access or higher to clear all data such as terms and categories via the /wp-json/folderly/v1/config/clear-all-data REST API endpoint. The issue is caused by an insufficient capability check that originally allowed users with the 'upload_files' capability to perform this action, which was too permissive. The fix involved changing the permission check to require 'manage_options', restricting this action to administrators only. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability allows an attacker with Author-level access or above to clear critical data like terms and categories from the WordPress site, potentially disrupting site organization and content management. This could lead to data loss and operational issues on the affected website.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking if the Folderly plugin version is 0.3 or below and by testing the /wp-json/folderly/v1/config/clear-all-data REST API endpoint for unauthorized access. Specifically, you can attempt to call this endpoint with an authenticated user having Author-level access and see if the data clearing action is permitted. For example, use curl commands to simulate REST API calls with different user credentials. However, no specific commands are provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediately update the Folderly plugin to a version that includes the security fix, which changes the REST API permission check from 'upload_files' capability to 'manage_options'. This restricts the sensitive REST API actions to administrators only, preventing unauthorized data clearing by lower-privileged users. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart