CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Lifecycle Timeline
3Description
Cross-Site Request Forgery (CSRF) vulnerability in codedraft Mediabay - WordPress Media Library Folders allows Reflected XSS. This issue affects Mediabay - WordPress Media Library Folders: from n/a through 1.4.
Analysis
Cross-Site Request Forgery (CSRF) vulnerability in the codedraft Mediabay WordPress plugin (versions up to 1.4) that enables reflected XSS attacks. Attackers can exploit this network-accessible vulnerability without authentication to perform unauthorized actions on behalf of authenticated users and inject malicious scripts, affecting WordPress installations using this media library plugin. The CVSS 7.1 score and absence of KEV/active exploitation data suggest moderate real-world risk with UI interaction required.
Technical Context
The vulnerability exists in the Mediabay - WordPress Media Library Folders plugin, which extends WordPress's native media management capabilities. The underlying issue is a CSRF vulnerability (CWE-352) that fails to implement proper token validation (such as WordPress nonces) when processing state-changing requests. This allows an attacker to craft malicious cross-origin requests that, when visited by authenticated WordPress administrators or users, execute unvalidated actions within the plugin's context. The reflected XSS component indicates that user input is reflected in HTTP responses without proper sanitization or output encoding, compounding the attack surface. The plugin integrates directly with WordPress's media library infrastructure (likely wp-admin AJAX handlers or media upload/folder management endpoints), making administrative users primary targets.
Affected Products
Product: Mediabay - WordPress Media Library Folders by codedraft; Affected versions: 1.4 and earlier (no lower bound specified, indicating all known versions through 1.4 are vulnerable); Platform: WordPress; Architecture: PHP-based plugin; No specific CPE string provided in source data, but implied CPE pattern: cpe:2.3:a:codedraft:mediabay:*:*:*:*:*:wordpress:*:* (versions ≤1.4); Deployment context: WordPress sites with plugin active and users with administrative or editorial roles.
Remediation
Immediate actions: (1) Update the Mediabay plugin to version 1.5 or later when available—vendors typically address CSRF via nonce implementation and XSS via output sanitization; (2) Review plugin changelog/vendor advisory (codedraft) for confirmation of patch scope; (3) Verify successful update in wp-admin > Plugins; (4) Monitor for suspicious media library activity in WordPress logs. Interim mitigations if patch unavailable: (a) Disable the plugin temporarily via wp-cli or wp-admin if not mission-critical; (b) Restrict plugin access via role-based capabilities; (c) Implement network-level CSRF protections (SameSite cookie attributes enforced at server level); (d) Educate administrators against clicking untrusted links while logged into WordPress; (e) Apply WordPress security hardening (disable file editing, restrict admin access by IP if feasible). Contact codedraft directly for patch ETA if version 1.5+ is not immediately available.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17166