Home

Description

The Media Sync plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.4.9 via the 'sub_dir' and 'media_items' parameters. This is due to insufficient validation of user-supplied file paths, which are not checked for directory traversal sequences or restricted to the intended uploads directory. This makes it possible for authenticated attackers, with Author-level access and above, to perform actions on files outside of the originally intended directory.

PUBLISHED Reserved 2026-04-20 | Published 2026-05-14 | Updated 2026-05-14 | Assigner Wordfence




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

Any version
affected

Timeline

2026-03-12:Discovered
2026-05-13:Disclosed

Credits

Drew Webber finder

References

www.wordfence.com/...-43fd-48c4-8507-6d94b9fed565?source=cve

plugins.trac.wordpress.org/changeset/3511221/media-sync

cve.org (CVE-2026-6670)

nvd.nist.gov (CVE-2026-6670)

Download JSON