Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1653: CWE-862 Missing Authorization in frenify Categorify – WordPress Media Library Category & File Manager

0
Medium
VulnerabilityCVE-2024-1653cvecve-2024-1653cwe-862
Published: Tue Feb 27 2024 (02/27/2024, 11:05:06 UTC)
Source: CVE
Vendor/Project: frenify
Product: Categorify – WordPress Media Library Category & File Manager

Description

The Categorify plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the categorifyAjaxUpdateFolderPosition in all versions up to, and including, 1.0.7.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to update the folder position of categories as well as update the metadata of other taxonomies.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 08:43:06 UTC

Technical Analysis

CVE-2024-1653 is a missing authorization vulnerability (CWE-862) identified in the Categorify – WordPress Media Library Category & File Manager plugin developed by frenify. The vulnerability exists in all versions up to and including 1.0.7.4. Specifically, the categorifyAjaxUpdateFolderPosition function lacks proper capability checks, allowing authenticated users with subscriber-level permissions or higher to update the folder positions of categories and modify metadata of other taxonomies within the WordPress media library. This flaw enables unauthorized modification of organizational data structures and metadata, potentially disrupting content categorization and management workflows. The vulnerability requires the attacker to be authenticated but does not require elevated privileges beyond subscriber level, nor does it require user interaction beyond login. The CVSS 3.1 base score is 4.3 (medium severity), with vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N indicating network exploitability, low attack complexity, low privileges required, no user interaction, unchanged scope, no confidentiality or availability impact, but integrity impact present. No patches or official fixes were linked at the time of reporting, and no known exploits have been observed in the wild. The vulnerability is relevant to any WordPress installation using the Categorify plugin, which is commonly used to enhance media library management by adding category and folder organization capabilities.

Potential Impact

The primary impact of CVE-2024-1653 is unauthorized modification of media library folder positions and taxonomy metadata, which can degrade the integrity of content organization within WordPress sites. This can lead to confusion, misclassification of media assets, and potential disruption of workflows relying on accurate media categorization. Although the vulnerability does not expose confidential data or cause denial of service, it undermines data integrity and trustworthiness of the media management system. Attackers with subscriber-level access, which is a low privilege role often granted to registered users or commenters, can exploit this flaw, increasing the risk of insider threats or compromised accounts being leveraged for unauthorized changes. For organizations relying heavily on media categorization for content delivery, marketing, or e-commerce, this could result in operational inefficiencies or reputational damage. However, the lack of known exploits and the requirement for authenticated access limit the immediate widespread impact.

Mitigation Recommendations

To mitigate CVE-2024-1653, organizations should first verify if they use the Categorify plugin and identify the installed version. Since no official patch links were provided at the time of disclosure, administrators should monitor the vendor’s website and WordPress plugin repository for updates addressing this vulnerability. In the interim, restrict subscriber-level user capabilities by hardening role permissions to prevent unauthorized access to media management functions. Employ WordPress security plugins that can enforce granular capability checks or block suspicious AJAX requests targeting categorifyAjaxUpdateFolderPosition. Implement multi-factor authentication (MFA) to reduce the risk of compromised low-privilege accounts. Regularly audit user roles and permissions to ensure only trusted users have subscriber or higher access. Additionally, monitor logs for unusual activity related to media library modifications. If feasible, temporarily disable or replace the Categorify plugin with alternative media management solutions until a secure version is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-02-19T23:58:23.204Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf6dd9

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 2/28/2026, 8:43:06 AM

Last updated: 3/25/2026, 3:07:29 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses