๐Ÿ” CVE Alert

CVE-2024-13897

MEDIUM 6.5

Moving Media Library <= 1.22 - Authenticated (Administrator+) Directory Traversal to Arbitrary File Deletion

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

The Moving Media Library plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the generate_json_page function in all versions up to, and including, 1.22. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

CWE CWE-22
Vendor katsushi-kawamori
Product moving media library
Published Mar 6, 2025
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for katsushi-kawamori moving media library

Be the first to know when new medium vulnerabilities affecting katsushi-kawamori moving media library are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

katsushi-kawamori / Moving Media Library
0 โ‰ค 1.22

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/815ce00b-3753-4c38-8a30-5242a5841734?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/moving-media-library/trunk/lib/class-movingmedialibraryadmin.php#L166 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3244709/moving-media-library/trunk/lib/class-movingmedialibraryadmin.php

Credits

Emil