Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11510: CWE-285 Improper Authorization in ninjateam FileBird – WordPress Media Library Folders & File Manager

0
Medium
VulnerabilityCVE-2025-11510cvecve-2025-11510cwe-285
Published: Sat Oct 18 2025 (10/18/2025, 06:42:47 UTC)
Source: CVE Database V5
Vendor/Project: ninjateam
Product: FileBird – WordPress Media Library Folders & File Manager

Description

The FileBird – WordPress Media Library Folders & File Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the /filebird/v1/fb-wipe-clear-all-data function in all versions up to, and including, 6.4.9. This makes it possible for authenticated attackers, with author-level access and above, to reset all of the plugin's configuration data.

AI-Powered Analysis

AILast updated: 10/18/2025, 07:09:11 UTC

Technical Analysis

CVE-2025-11510 is an improper authorization vulnerability (CWE-285) found in the FileBird – WordPress Media Library Folders & File Manager plugin developed by ninjateam. The vulnerability affects all versions up to and including 6.4.9. The root cause is the absence of a capability check on the REST API endpoint /filebird/v1/fb-wipe-clear-all-data, which is intended to clear all plugin configuration data. Because of this missing authorization, any authenticated user with author-level permissions or higher can invoke this endpoint to reset the plugin's settings without proper privileges. This can lead to unauthorized modification of configuration data, potentially disrupting the organization of media files and folders within WordPress. The vulnerability has a CVSS 3.1 base score of 4.3 (medium severity), reflecting low impact on confidentiality and availability but some impact on integrity due to unauthorized changes. Exploitation requires authentication at the author level or above but no user interaction. The vulnerability is network exploitable via the WordPress REST API. No public exploits or patches are currently available, but the issue has been officially published and reserved in the CVE database as of October 2025.

Potential Impact

For European organizations, this vulnerability could disrupt media management on WordPress sites by allowing unauthorized users with author-level access to reset plugin configurations. This may cause operational inefficiencies, loss of organizational structure in media libraries, and potential downtime in content management workflows. While it does not expose sensitive data or cause denial of service, the integrity of media management is compromised. Organizations relying heavily on WordPress for digital content, marketing, and communications could face productivity losses. Additionally, attackers could leverage this vulnerability as part of a broader attack chain to weaken site management controls. The impact is more significant in environments where author-level access is granted to multiple users or where internal access controls are lax.

Mitigation Recommendations

Until an official patch is released, European organizations should restrict author-level access to trusted personnel only and audit existing user permissions to minimize risk. Implement strict role-based access control (RBAC) policies to ensure only necessary users have author-level or higher privileges. Monitor REST API usage logs for suspicious calls to the /filebird/v1/fb-wipe-clear-all-data endpoint. Consider disabling or restricting access to the FileBird plugin if feasible, especially on high-value or public-facing WordPress sites. Once a patch is available, promptly update the plugin to the fixed version. Additionally, implement web application firewalls (WAFs) with custom rules to detect and block unauthorized API requests targeting this endpoint. Regularly back up WordPress configurations and media libraries to enable quick recovery if unauthorized changes occur.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-10-08T15:06:17.946Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f33944197c8629076f80d3

Added to database: 10/18/2025, 6:52:52 AM

Last enriched: 10/18/2025, 7:09:11 AM

Last updated: 10/20/2025, 5:39:55 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats