CVE-2023-0725
Wicked Folders <= 2.18.16 - Cross-Site Request Forgery via ajax_clone_folder
CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_clone_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.
| CWE | CWE-352 |
| Vendor | wickedplugins |
| Product | wicked folders – folder organizer for pages, posts, and custom post types |
| Published | Feb 8, 2023 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for wickedplugins wicked folders – folder organizer for pages, posts, and custom post types
Be the first to know when new medium vulnerabilities affecting wickedplugins wicked folders – folder organizer for pages, posts, and custom post types are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
wickedplugins / Wicked Folders – Folder Organizer for Pages, Posts, and Custom Post Types
0 ≤ 2.18.16
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/80797183-c69f-4dce-a2e0-52a395ceffaa?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail= wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/80797183-c69f-4dce-a2e0-52a395ceffaa
Credits
Marco Wotschka