CVE-2025-12640
Unknown Unknown - Not Provided
Unauthorized Media Replacement in Folders Plugin via Missing Authorization

Publication date: 2026-01-08

Last updated on: 2026-01-08

Assigner: Wordfence

Description
The Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager plugin for WordPress is vulnerable to Unauthorized Arbitrary Media Replacement in all versions up to, and including, 3.1.5. This is due to missing object-level authorization checks in the handle_folders_file_upload() function. This makes it possible for authenticated attackers, with Author-level access and above, to replace arbitrary media files from the WordPress Media Library.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-08
Last Modified
2026-01-08
Generated
2026-05-07
AI Q&A
2026-01-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
folders unlimited_folders_to_organize_media_library to 3.1.5 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager plugin for WordPress, versions up to and including 3.1.5. It is caused by missing object-level authorization checks in the handle_folders_file_upload() function, which allows authenticated users with Author-level access or higher to replace arbitrary media files in the WordPress Media Library without proper permission checks. [1]


How can this vulnerability impact me? :

An attacker with Author-level access or higher can exploit this vulnerability to replace arbitrary media files in the WordPress Media Library. This could lead to unauthorized modification of media content, potentially allowing the attacker to upload malicious files or alter existing media, which may compromise the integrity and trustworthiness of the website's content. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking if your WordPress installation is running the Folders plugin version 3.1.5 or earlier. Additionally, monitoring for unauthorized media file replacements by authenticated users with Author-level access or higher could indicate exploitation attempts. There are no specific commands provided in the resources to detect this vulnerability on your system or network.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately update the Folders plugin to version 3.1.6 or later, which includes security enhancements that enforce strict permission checks in the handle_folders_file_upload() function. This update ensures that only users with both the 'edit_post' capability on the specific attachment and the 'upload_files' capability can replace media files, preventing unauthorized arbitrary media replacement. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart