The Media Library Assistant plugin for WordPress is vulnerable to arbitrary file deletion in the /wp-content/uploads directory due to insufficient file path validation and user capability checking in the _process_mla_download_file function in all versions up to, and including, 3.27. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server from the /wp-content/uploads/ directory.
Metrics
Affected Vendors & Products
References
History
Tue, 19 Aug 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 19 Aug 2025 04:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Media Library Assistant plugin for WordPress is vulnerable to arbitrary file deletion in the /wp-content/uploads directory due to insufficient file path validation and user capability checking in the _process_mla_download_file function in all versions up to, and including, 3.27. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server from the /wp-content/uploads/ directory. | |
Title | Media Library Assistant <= 3.27 - Authenticated (Author+) Limited File Deletion | |
Weaknesses | CWE-862 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-08-19T04:26:02.471Z
Updated: 2025-08-19T19:21:48.133Z
Reserved: 2025-07-30T13:56:59.477Z
Link: CVE-2025-8357

Updated: 2025-08-19T19:21:45.415Z

Status : Awaiting Analysis
Published: 2025-08-19T05:15:30.900
Modified: 2025-08-19T13:42:47.510
Link: CVE-2025-8357

No data.