Description
The Folderly plugin for WordPress is vulnerable to unauthorized modification of data due to an insufficient capability check on the /wp-json/folderly/v1/config/clear-all-data REST API endpoint in all versions up to, and including, 0.3. This makes it possible for authenticated attackers, with Author-level access and above, to clear all data like terms and categories.
Problem types
CWE-863 Incorrect Authorization
Product status
* (semver)
Timeline
| 2025-10-21: | Vendor Notified |
| 2025-10-31: | Disclosed |
Credits
Athiwat Tiprasaharn
References
www.wordfence.com/...-c6aa-4340-a0e0-41e04e958848?source=cve
plugins.trac.wordpress.org/...6/folderly/trunk/includes/Rest