CVE-2025-49986

5.3 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in the Video List Manager WordPress plugin that allows attackers to access functionality not properly restricted by access controls. Attackers can exploit this to perform actions they shouldn't have permission for, affecting all WordPress sites running vulnerable versions of the plugin.

💻 Affected Systems

Products:
  • Video List Manager WordPress Plugin
Versions: All versions up to and including 1.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the Video List Manager plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify or delete video lists, potentially defacing websites or disrupting content management functionality.

🟠

Likely Case

Unauthorized users accessing administrative functions to view or modify video content they shouldn't have access to.

🟢

If Mitigated

With proper access controls, only authorized users can manage video lists as intended.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access but bypasses authorization checks for specific functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.7

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/video-list-manager/vulnerability/wordpress-video-list-manager-plugin-1-7-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Go to Plugins → Installed Plugins
3. Find Video List Manager
4. Click 'Update Now' if update available
5. If no update, deactivate and remove plugin until patched version is released

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily deactivate the Video List Manager plugin until patched version is available

wp plugin deactivate video-list-manager

Restrict Access

all

Implement additional access controls at web server or application firewall level

🧯 If You Can't Patch

  • Implement strict role-based access controls at the WordPress level
  • Monitor for unauthorized access attempts to video management functionality

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Video List Manager version number

Check Version:

wp plugin list --name=video-list-manager --field=version

Verify Fix Applied:

Verify plugin version is greater than 1.7 and test authorization controls for video management functions

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to video management endpoints
  • Unexpected modifications to video lists

Network Indicators:

  • Requests to /wp-admin/admin-ajax.php with video-list-manager actions from unauthorized IPs

SIEM Query:

source="wordpress.log" AND ("video-list-manager" OR "video_list_manager") AND ("unauthorized" OR "403" OR "permission denied")

🔗 References

📤 Share & Export