The WP Media Category Management plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions 2.0 to 2.3.3. This is due to missing or incorrect nonce validation on the wp_mcm_handle_action_settings() function. This makes it possible for unauthenticated attackers to alter plugin settings, such as the taxonomy used for media, the base slug for media categories, and the default media category via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Wed, 19 Feb 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 19 Feb 2025 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WP Media Category Management plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions 2.0 to 2.3.3. This is due to missing or incorrect nonce validation on the wp_mcm_handle_action_settings() function. This makes it possible for unauthenticated attackers to alter plugin settings, such as the taxonomy used for media, the base slug for media categories, and the default media category via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |
Title | WP Media Category Management 2.0 - 2.3.3 - Cross-Site Request Forgery to Settings Update | |
Weaknesses | CWE-352 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-02-19T07:32:05.707Z
Updated: 2025-02-19T21:18:21.055Z
Reserved: 2025-01-29T22:18:10.528Z
Link: CVE-2025-0865

Updated: 2025-02-19T21:18:15.552Z

Status : Received
Published: 2025-02-19T08:15:21.853
Modified: 2025-02-19T08:15:21.853
Link: CVE-2025-0865

No data.