CVE-2024-13897
Published: 06 March 2025
Summary
CVE-2024-13897 is a medium-severity Path Traversal (CWE-22) vulnerability in Wordpress (inferred from references). Its CVSS base score is 6.5 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique File Deletion (T1070.004); ranked in the top 5.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the vulnerability by requiring timely patching of the Moving Media Library plugin to fix the path traversal flaw.
Enforces validation of file path inputs in the generate_json_page function to prevent arbitrary file deletion via path traversal.
Limits the scope of administrator privileges to reduce the number of users able to exploit the vulnerability for arbitrary file deletion.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file deletion via path traversal directly enables T1070.004 (File Deletion) and T1485 (Data Destruction), with potential for availability impact or RCE via critical file removal.
NVD Description
The Moving Media Library plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the generate_json_page function in all versions up to, and including, 1.22. This makes it possible for authenticated attackers, with Administrator-level…
more
access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Deeper analysisAI
CVE-2024-13897 is an arbitrary file deletion vulnerability in the Moving Media Library plugin for WordPress, affecting all versions up to and including 1.22. The issue arises from insufficient file path validation in the generate_json_page function within the class-movingmedialibraryadmin.php file, classified under CWE-22 (Path Traversal). It has a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H), highlighting moderate severity with high integrity and availability impacts.
Authenticated attackers possessing Administrator-level access or higher can exploit this vulnerability over the network with low complexity. By manipulating file paths, they can delete arbitrary files on the server, potentially leading to remote code execution—for instance, by targeting critical files such as wp-config.php.
Advisories and patch references include Wordfence's threat intelligence report, which details the vulnerability, alongside plugin source code at line 166 of class-movingmedialibraryadmin.php and changeset 3244709, which addresses the issue in the trunk. Security practitioners should update the plugin to a version beyond 1.22 incorporating these fixes.
Details
- CWE(s)