Cyber Posture

CVE-2024-13897

Medium

Published: 06 March 2025

Published
06 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.1499 94.6th percentile
Risk Priority 22 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-13897 is a medium-severity Path Traversal (CWE-22) vulnerability in Wordpress (inferred from references). Its CVSS base score is 6.5 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique File Deletion (T1070.004); ranked in the top 5.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to File Deletion (T1070.004) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the vulnerability by requiring timely patching of the Moving Media Library plugin to fix the path traversal flaw.

prevent

Enforces validation of file path inputs in the generate_json_page function to prevent arbitrary file deletion via path traversal.

prevent

Limits the scope of administrator privileges to reduce the number of users able to exploit the vulnerability for arbitrary file deletion.

MITRE ATT&CK Enterprise TechniquesAI

T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
T1485 Data Destruction Impact
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.
Why these techniques?

Arbitrary file deletion via path traversal directly enables T1070.004 (File Deletion) and T1485 (Data Destruction), with potential for availability impact or RCE via critical file removal.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The Moving Media Library plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the generate_json_page function in all versions up to, and including, 1.22. This makes it possible for authenticated attackers, with Administrator-level…

more

access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

Deeper analysisAI

CVE-2024-13897 is an arbitrary file deletion vulnerability in the Moving Media Library plugin for WordPress, affecting all versions up to and including 1.22. The issue arises from insufficient file path validation in the generate_json_page function within the class-movingmedialibraryadmin.php file, classified under CWE-22 (Path Traversal). It has a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H), highlighting moderate severity with high integrity and availability impacts.

Authenticated attackers possessing Administrator-level access or higher can exploit this vulnerability over the network with low complexity. By manipulating file paths, they can delete arbitrary files on the server, potentially leading to remote code execution—for instance, by targeting critical files such as wp-config.php.

Advisories and patch references include Wordfence's threat intelligence report, which details the vulnerability, alongside plugin source code at line 166 of class-movingmedialibraryadmin.php and changeset 3244709, which addresses the issue in the trunk. Security practitioners should update the plugin to a version beyond 1.22 incorporating these fixes.

Details

CWE(s)

Affected Products

Wordpress
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-13377Shared CWE-22
CVE-2026-27040Shared CWE-22
CVE-2026-24135Shared CWE-22
CVE-2025-15589Shared CWE-22
CVE-2025-68862Shared CWE-22
CVE-2025-65879Shared CWE-22
CVE-2026-31913Shared CWE-22
CVE-2025-5391Shared CWE-22
CVE-2026-25161Shared CWE-22
CVE-2026-24969Shared CWE-22

References