The Folderly plugin for WordPress is vulnerable to unauthorized modification of data due to an insufficient capability check on the /wp-json/folderly/v1/config/clear-all-data REST API endpoint in all versions up to, and including, 0.3. This makes it possible for authenticated attackers, with Author-level access and above, to clear all data like terms and categories.
Metrics
Affected Vendors & Products
References
History
Sat, 01 Nov 2025 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Folderly plugin for WordPress is vulnerable to unauthorized modification of data due to an insufficient capability check on the /wp-json/folderly/v1/config/clear-all-data REST API endpoint in all versions up to, and including, 0.3. This makes it possible for authenticated attackers, with Author-level access and above, to clear all data like terms and categories. | |
| Title | Folderly <= 0.3 - Incorrect Authorization to Authenticated (Author+) Term Deletion | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-11-01T05:40:23.582Z
Updated: 2025-11-01T05:40:23.582Z
Reserved: 2025-10-21T18:17:23.009Z
Link: CVE-2025-12038
No data.
Status : Received
Published: 2025-11-01T06:15:40.160
Modified: 2025-11-01T06:15:40.160
Link: CVE-2025-12038
No data.