Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2312: CWE-862 Missing Authorization in maxfoundry Media Library Folders

0
Medium
VulnerabilityCVE-2026-2312cvecve-2026-2312cwe-862
Published: Sat Feb 14 2026 (02/14/2026, 11:24:28 UTC)
Source: CVE Database V5
Vendor/Project: maxfoundry
Product: Media Library Folders

Description

The Media Library Folders plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 8.3.6 via the delete_maxgalleria_media() and maxgalleria_rename_image() functions due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to delete or rename attachments owned by other users (including administrators). The rename flow also deletes all postmeta for the target attachment, causing data loss.

AI-Powered Analysis

AILast updated: 02/14/2026, 12:03:31 UTC

Technical Analysis

CVE-2026-2312 is a vulnerability classified under CWE-862 (Missing Authorization) found in the maxfoundry Media Library Folders plugin for WordPress, affecting all versions up to and including 8.3.6. The flaw arises from insufficient validation of user-controlled keys in two critical functions: delete_maxgalleria_media() and maxgalleria_rename_image(). These functions fail to verify whether the authenticated user has the proper authorization to delete or rename media attachments owned by other users. As a result, any user with Author-level privileges or higher can exploit this insecure direct object reference (IDOR) to manipulate media files they do not own. The rename function is particularly destructive because it deletes all postmeta data associated with the targeted media attachment, which can cause significant data loss and disrupt site content management. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 score of 4.3 reflects a medium severity, primarily due to the limited scope of impact (integrity only) and the requirement for authenticated access with elevated privileges. No patches or exploit code are currently publicly available, but the risk remains significant for sites relying on this plugin for media management.

Potential Impact

For European organizations, the impact of CVE-2026-2312 includes unauthorized modification and deletion of media assets on WordPress sites, which can lead to data loss, content disruption, and potential reputational damage. Organizations that rely heavily on WordPress for content management, especially those using the Media Library Folders plugin to organize media, may face operational challenges if attackers manipulate or remove critical media files. The loss of postmeta data can affect site functionality, SEO metadata, and internal content references, complicating recovery efforts. While the vulnerability does not directly expose sensitive data or cause denial of service, the integrity compromise can undermine trust in the affected websites and require costly remediation. Given the widespread use of WordPress across European businesses, media companies, and public sector websites, the threat is relevant and should be addressed promptly to maintain content integrity and operational continuity.

Mitigation Recommendations

To mitigate CVE-2026-2312, organizations should first verify if their WordPress installations use the maxfoundry Media Library Folders plugin and identify the plugin version. Since no official patch links are currently available, immediate mitigation includes restricting Author-level and higher user privileges to only trusted personnel, minimizing the risk of exploitation. Administrators should audit user roles and permissions to ensure least privilege principles are enforced. Additionally, monitoring and logging media-related actions can help detect suspicious deletion or renaming activities. Organizations can implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable functions. Backup strategies should be reviewed and enhanced to ensure rapid restoration of media files and associated metadata in case of data loss. Finally, organizations should stay alert for official patches or updates from maxfoundry and apply them promptly once released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-10T21:49:00.293Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69906138c9e1ff5ad886470f

Added to database: 2/14/2026, 11:49:12 AM

Last enriched: 2/14/2026, 12:03:31 PM

Last updated: 2/15/2026, 2:06:35 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats