CVE-2025-49986
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-20

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Missing Authorization vulnerability in thanhtungtnt Video List Manager video-list-manager allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Video List Manager: from n/a through <= 1.7.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-20
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2025-06-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Broken Access Control issue in the WordPress Video List Manager plugin (up to version 1.7). It occurs due to missing authorization, authentication, or nonce token checks, which allows unauthenticated users to perform actions that should be restricted to higher-privileged users. Essentially, unauthorized users can access functionality that is not properly protected by access control lists (ACLs). [1]


How can this vulnerability impact me? :

This vulnerability can allow attackers who are not logged in to perform privileged actions within the Video List Manager plugin. This could lead to unauthorized changes or manipulations of video lists or related content. Since the plugin is abandoned and no official fix is available, the risk remains unless mitigated by removing the plugin or applying a virtual patch. Deactivating the plugin alone does not fully mitigate the risk. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection involves identifying the presence of the vulnerable Video List Manager plugin version 1.7 or earlier on your WordPress installation. You can check the installed plugin version via WordPress admin dashboard or by inspecting the plugin files. There are no specific commands provided for direct detection of exploitation attempts. However, monitoring web server logs for unauthorized access patterns or unusual requests to the plugin's functionality may help. Since the vulnerability allows unauthenticated users to perform privileged actions, look for suspicious HTTP requests targeting the plugin endpoints. No official detection scripts or commands are provided. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include removing and replacing the vulnerable Video List Manager plugin, as no official fix or updated version is available. Deactivating the plugin alone does not fully mitigate the risk unless a virtual patch (vPatch) is applied. Patchstack offers a virtual patch that provides immediate protection by auto-mitigating the vulnerability. Users should consider alternative plugins and seek professional incident response if compromise is suspected. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart