VYPR
Medium severity4.3NVD Advisory· Published Apr 24, 2025· Updated Apr 23, 2026

CVE-2025-46519

CVE-2025-46519

Description

Missing Authorization vulnerability in M.Code Media Library Downloader media-library-downloader allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Media Library Downloader: from n/a through <= 1.3.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing authorization vulnerability in the Media Library Downloader WordPress plugin (<=1.3.1) allows attackers to exploit incorrectly configured access controls, potentially leading to unauthorized actions.

Vulnerability

Overview The Media Library Downloader plugin for WordPress (versions up to and including 1.3.1) contains a missing authorization vulnerability. The plugin fails to properly verify user permissions before allowing access to certain functions, such as downloading media files. This is a classic broken access control issue where the software does not enforce the correct access restrictions [1].

Exploitation

Details An attacker can exploit this vulnerability by sending crafted HTTP requests to the affected plugin. The attack requires no special privileges beyond a low-level authenticated user account (e.g., subscriber) or possibly no authentication at all, depending on the specific missing check. The vulnerability is remotely exploitable over the network and does not require any user interaction [1].

Impact

Successful exploitation allows an attacker to download media files from the WordPress media library that should be restricted. This could lead to exposure of sensitive or private media content. The vulnerability has a CVSS v3 base score of 4.3 (Medium) and is noted to be used in mass-exploit campaigns targeting thousands of websites [1].

Mitigation

The vendor has released version 1.3.2 of the plugin, which addresses the missing authorization. Users are strongly advised to update to this version immediately. Patchstack users can enable auto-update for vulnerable plugins. No workaround is available [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.