🔐 CVE Alert

CVE-2023-0726

MEDIUM 5.4

Wicked Folders <= 2.18.16 - Cross-Site Request Forgery via ajax_edit_folder

CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th

The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_edit_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.

CWE CWE-352
Vendor wickedplugins
Product wicked folders – folder organizer for pages, posts, and custom post types
Published Feb 8, 2023
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for wickedplugins wicked folders – folder organizer for pages, posts, and custom post types

Be the first to know when new medium vulnerabilities affecting wickedplugins wicked folders – folder organizer for pages, posts, and custom post types are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

wickedplugins / Wicked Folders – Folder Organizer for Pages, Posts, and Custom Post Types
0 ≤ 2.18.16

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/51b88442-3961-42e2-8ff4-7726819a7f0f?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail= wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/51b88442-3961-42e2-8ff4-7726819a7f0f

Credits

Marco Wotschka