Skip to main content

CVE-2025-28948: CWE-352 Cross-Site Request Forgery (CSRF) in codedraft Mediabay - WordPress Media Library Folders

High
VulnerabilityCVE-2025-28948cvecve-2025-28948cwe-352
Published: Fri Jun 06 2025 (06/06/2025, 12:54:35 UTC)
Source: CVE Database V5
Vendor/Project: codedraft
Product: Mediabay - WordPress Media Library Folders

Description

Cross-Site Request Forgery (CSRF) vulnerability in codedraft Mediabay - WordPress Media Library Folders allows Reflected XSS. This issue affects Mediabay - WordPress Media Library Folders: from n/a through 1.4.

AI-Powered Analysis

AILast updated: 07/08/2025, 00:11:38 UTC

Technical Analysis

CVE-2025-28948 is a high-severity vulnerability classified as CWE-352, indicating a Cross-Site Request Forgery (CSRF) issue in the codedraft Mediabay - WordPress Media Library Folders plugin. This plugin facilitates media management within WordPress by organizing media files into folders. The vulnerability affects versions up to 1.4. The core issue is that the plugin does not adequately verify the authenticity of requests made to it, allowing an attacker to craft malicious requests that a logged-in user might unwittingly execute. This CSRF flaw is compounded by the presence of reflected Cross-Site Scripting (XSS), which can be leveraged to bypass user interaction requirements or escalate the attack's impact. According to the CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L), the attack can be launched remotely over the network without privileges but requires user interaction, such as clicking a crafted link. The vulnerability affects confidentiality, integrity, and availability, with a scope change (S:C) indicating that exploitation can affect resources beyond the vulnerable component. Although no known exploits are currently in the wild, the vulnerability's characteristics make it a significant risk, especially given the widespread use of WordPress and its plugins. The absence of available patches at the time of publication increases the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability poses a notable risk, particularly for those relying on WordPress websites with the Mediabay plugin installed. Exploitation could allow attackers to perform unauthorized actions on behalf of authenticated users, potentially leading to data leakage (confidentiality impact), unauthorized modifications of media assets or site content (integrity impact), and disruption of media management functions (availability impact). Given the plugin's role in managing media libraries, attackers might manipulate or delete critical media files, affecting website functionality and user experience. Additionally, the reflected XSS component could facilitate session hijacking or further compromise user accounts. Organizations in sectors such as e-commerce, media, education, and government, which often use WordPress for content management, could face reputational damage, regulatory scrutiny under GDPR for data breaches, and operational disruptions. The vulnerability's network attack vector and lack of required privileges make it accessible to a broad range of attackers, increasing the threat landscape for European entities.

Mitigation Recommendations

1. Immediate mitigation should include disabling or uninstalling the Mediabay - WordPress Media Library Folders plugin until an official patch is released. 2. Implement Web Application Firewall (WAF) rules to detect and block CSRF and reflected XSS attack patterns targeting the plugin's endpoints. 3. Enforce strict Content Security Policy (CSP) headers to mitigate the impact of reflected XSS. 4. Educate users and administrators to avoid clicking on suspicious links, especially when logged into WordPress admin interfaces. 5. Monitor web server and application logs for unusual POST requests or suspicious referrers that may indicate exploitation attempts. 6. Once available, promptly apply vendor patches or updates addressing this vulnerability. 7. Consider deploying multi-factor authentication (MFA) for WordPress admin accounts to reduce the risk of session hijacking. 8. Conduct regular security audits and vulnerability scans focusing on WordPress plugins to identify and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-03-11T08:10:12.305Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6842edda71f4d251b5c87f2d

Added to database: 6/6/2025, 1:32:10 PM

Last enriched: 7/8/2025, 12:11:38 AM

Last updated: 8/2/2025, 4:39:28 AM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats