Vulnerability Description
The Media Library Assistant plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the mla_update_compat_fields_action() function in all versions up to, and including, 3.33. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify taxonomy terms on arbitrary attachments.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/media-library-assistant/tags/3.32/inc
- https://plugins.trac.wordpress.org/browser/media-library-assistant/tags/3.32/inc
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new
- https://www.wordfence.com/threat-intel/vulnerabilities/id/2655f936-8177-4836-a0b
FAQ
What is CVE-2026-3072?
CVE-2026-3072 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The Media Library Assistant plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the mla_update_compat_fields_action() function in all versions ...
How severe is CVE-2026-3072?
CVE-2026-3072 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3072?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.