FileBird Vulnerability – WordPress Media Library Folders & File Manager – Authenticated Insecure Direct Object Reference – CVE-2024-2346 | WordPress Plugin Vulnerability Report

Plugin Name: FileBird – WordPress Media Library Folders & File Manager

Key Information:

  • Software Type: Plugin
  • Software Slug: filebird
  • Software Status: Active
  • Software Author: ninjateam
  • Software Downloads: 4,220,916
  • Active Installs: 200,000
  • Last Updated: April 25, 2024
  • Patched Versions: 5.6.4
  • Affected Versions: <= 5.6.3

Vulnerability Details:

  • Name: FileBird – WordPress Media Library Folders & File Manager <= 5.6.3
  • Title: Authenticated (Author+) Insecure Direct Object Reference
  • Type: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
  • CVE: CVE-2024-2346
  • CVSS Score: 5.4
  • Publicly Published: April 16, 2024
  • Researcher: Tim Coen
  • Description: The FileBird plugin is vulnerable to Insecure Direct Object Reference (IDOR) in all versions up to and including 5.6.3 due to missing validation on a user-controlled key. This vulnerability allows authenticated attackers with author-level access or higher to delete folders not owned by them, potentially exposing private files.


The FileBird plugin for WordPress, widely used for organizing media library folders, has a security vulnerability in versions up to and including 5.6.3 that allows users with author-level privileges to manipulate folder visibility and deletion. This security lapse has been addressed in the updated version 5.6.4, which implements necessary validation checks to curb unauthorized folder access.

Detailed Overview:

Discovered by researcher Tim Coen, this vulnerability specifically impacts the folder management functionalities of the FileBird plugin. By exploiting the IDOR vulnerability, attackers with sufficient permissions can delete folders, causing disruption and potential data loss. The threat poses a significant risk as it could lead to unauthorized disclosure and alteration of media files. Immediate updates to the latest patched version are crucial to mitigate these risks and protect the integrity of media files managed through WordPress.

Advice for Users:

  • Immediate Action: Update to version 5.6.4 immediately to prevent exploitation of this vulnerability.
  • Check for Signs of Vulnerability: Review your media library for any unexpected changes or deletions that might indicate this vulnerability has been exploited.
  • Alternate Plugins: If continued security concerns exist, consider exploring other media library management plugins with robust security features.
  • Stay Updated: Always keep your WordPress plugins updated to the latest versions to defend against known vulnerabilities.


The swift action taken by the developers of FileBird to rectify this vulnerability highlights the ongoing challenge of maintaining secure digital platforms. As a WordPress site owner, especially for those managing significant online content, recognizing the importance of regular updates is key to safeguarding your website. The recent patch not only resolves the specific issue but also reinforces the necessity of vigilant security practices to protect against potential threats.


Detailed Report: 

In the digital realm, the security of our websites often hinges on the robustness of the plugins we use. The recent revelation of a significant security vulnerability within the FileBird – WordPress Media Library Folders & File Manager plugin serves as a stark reminder of this reality. This plugin, essential for countless WordPress users in managing media library folders efficiently, has been found vulnerable to Insecure Direct Object Reference (IDOR), impacting versions up to and including 5.6.3. This flaw not only compromises the integrity of website data but also highlights the broader implications of neglecting software updates.

Detailed Overview

Discovered by cybersecurity expert Tim Coen, this vulnerability specifically exploits insufficient validation mechanisms within FileBird’s folder management functionalities. By allowing contributors and higher-level users to perform actions on folders they do not own, the plugin opened doors to data breaches and unauthorized data manipulation, posing significant risks to user privacy and data integrity.

Historical Context

This is not the first time vulnerabilities have been reported for FileBird. Since June 16, 2021, three previous vulnerabilities have been identified, emphasizing the need for ongoing vigilance and regular updates.


The rapid resolution of this vulnerability by FileBird's development team is commendable and underscores the importance of proactive security measures in software management. For small business owners managing WordPress websites, it's a stark reminder of the critical nature of software maintenance. Staying current with updates isn't just about accessing new features—it's a vital defense against potential threats. Regular updates, combined with vigilant security practices, are your best defense against the evolving landscape of cyber threats.

Staying Secure

Staying on top of WordPress security can feel overwhelming for small business owners without dedicated IT staff. At Your WP Guy, we exist to shoulder that burden for you. Our WordPress experts can fully audit, secure, maintain and support your site - so you can focus on growing your business with peace of mind.

Don't tackle security risks alone. Let us help you assess any impact from this vulnerability, update your plugins, and implement ongoing maintenance to avoid future threats. We treat your website like it's our own - because we know how critical it is for reaching your customers.

Get in touch for a free consultation today on making WordPress security stress-free. Call 678-995-5169 or book a call here. Our knowledgeable team is ready to help you safeguard your online presence.

FileBird Vulnerability – WordPress Media Library Folders & File Manager – Authenticated Insecure Direct Object Reference – CVE-2024-2346 | WordPress Plugin Vulnerability Report FAQs

Leave a Comment