The Media Library Folders plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 8.3.6 via the delete_maxgalleria_media() and maxgalleria_rename_image() functions due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to delete or rename attachments owned by other users (including administrators). The rename flow also deletes all postmeta for the target attachment, causing data loss.
Metrics
Affected Vendors & Products
References
History
Sat, 14 Feb 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Media Library Folders plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 8.3.6 via the delete_maxgalleria_media() and maxgalleria_rename_image() functions due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to delete or rename attachments owned by other users (including administrators). The rename flow also deletes all postmeta for the target attachment, causing data loss. | |
| Title | Media Library Folders <= 8.3.6 - Insecure Direct Object Reference to Authenticated (Author+) Arbitrary Attachment Deletion and Rename | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-02-14T11:24:28.662Z
Reserved: 2026-02-10T21:49:00.293Z
Link: CVE-2026-2312
No data.
Status : Received
Published: 2026-02-14T12:15:56.123
Modified: 2026-02-14T12:15:56.123
Link: CVE-2026-2312
No data.
OpenCVE Enrichment
No data.