CVE-2025-49986
BaseFortify
Publication date: 2025-06-20
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Broken Access Control issue in the WordPress Video List Manager plugin (up to version 1.7). It occurs due to missing authorization, authentication, or nonce token checks, which allows unauthenticated users to perform actions that should be restricted to higher-privileged users. Essentially, unauthorized users can access functionality that is not properly protected by access control lists (ACLs). [1]
How can this vulnerability impact me? :
This vulnerability can allow attackers who are not logged in to perform privileged actions within the Video List Manager plugin. This could lead to unauthorized changes or manipulations of video lists or related content. Since the plugin is abandoned and no official fix is available, the risk remains unless mitigated by removing the plugin or applying a virtual patch. Deactivating the plugin alone does not fully mitigate the risk. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection involves identifying the presence of the vulnerable Video List Manager plugin version 1.7 or earlier on your WordPress installation. You can check the installed plugin version via WordPress admin dashboard or by inspecting the plugin files. There are no specific commands provided for direct detection of exploitation attempts. However, monitoring web server logs for unauthorized access patterns or unusual requests to the plugin's functionality may help. Since the vulnerability allows unauthenticated users to perform privileged actions, look for suspicious HTTP requests targeting the plugin endpoints. No official detection scripts or commands are provided. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include removing and replacing the vulnerable Video List Manager plugin, as no official fix or updated version is available. Deactivating the plugin alone does not fully mitigate the risk unless a virtual patch (vPatch) is applied. Patchstack offers a virtual patch that provides immediate protection by auto-mitigating the vulnerability. Users should consider alternative plugins and seek professional incident response if compromise is suspected. [1]