The Folderly plugin for WordPress is vulnerable to unauthorized modification of data due to an insufficient capability check on the /wp-json/folderly/v1/config/clear-all-data REST API endpoint in all versions up to, and including, 0.3. This makes it possible for authenticated attackers, with Author-level access and above, to clear all data like terms and categories.
References
Configurations
No configuration.
History
01 Nov 2025, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-01 06:15
Updated : 2025-11-04 15:41
NVD link : CVE-2025-12038
Mitre link : CVE-2025-12038
CVE.ORG link : CVE-2025-12038
JSON object : View
Products Affected
No product.
CWE
CWE-863
Incorrect Authorization
