Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7721: CWE-862 Missing Authorization in bplugins HTML5 Video Player – mp4 Video Player Plugin and Block

0
Medium
VulnerabilityCVE-2024-7721cvecve-2024-7721cwe-862
Published: Wed Sep 11 2024 (09/11/2024, 04:31:20 UTC)
Source: CVE Database V5
Vendor/Project: bplugins
Product: HTML5 Video Player – mp4 Video Player Plugin and Block

Description

CVE-2024-7721 is a medium-severity vulnerability in the HTML5 Video Player – mp4 Video Player Plugin and Block for WordPress, affecting all versions up to 2. 5. 34. The issue arises from a missing authorization check in the 'save_password' function, allowing authenticated users with Subscriber-level access or higher to modify plugin options without proper permission validation. This can lead to unauthorized changes such as enabling user registration even if it was previously disabled. The vulnerability does not impact confidentiality or availability but can affect integrity by allowing unauthorized configuration changes. Exploitation requires authenticated access but no user interaction beyond that. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize patching or implementing strict access controls to mitigate risk. Countries with significant WordPress usage and a large number of websites running this plugin are most at risk, including the United States, India, Brazil, Germany, and the United Kingdom.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:46:37 UTC

Technical Analysis

CVE-2024-7721 is a vulnerability classified under CWE-862 (Missing Authorization) found in the HTML5 Video Player – mp4 Video Player Plugin and Block for WordPress. The flaw exists because the 'save_password' function lacks a proper capability check, allowing authenticated users with minimal privileges (Subscriber-level or higher) to modify plugin options arbitrarily. This includes the ability to set any options not explicitly protected by a false check to an array, such as enabling user registration on the WordPress site, which could otherwise be disabled by administrators. The vulnerability affects all plugin versions up to and including 2.5.34. The CVSS v3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires low privileges, no user interaction, and impacts integrity but not confidentiality or availability. Although no known exploits have been reported in the wild, the vulnerability poses a risk of unauthorized configuration changes that could facilitate further attacks or compromise site management. The plugin is widely used in WordPress environments, making this a relevant concern for many websites relying on it for video playback functionality.

Potential Impact

The primary impact of CVE-2024-7721 is the unauthorized modification of plugin settings by low-privileged authenticated users. This can lead to changes such as enabling user registration on a WordPress site, which may have been intentionally disabled to prevent unauthorized account creation. Such changes can increase the attack surface by allowing attackers or malicious users to create accounts, potentially leading to privilege escalation or further exploitation. While the vulnerability does not directly expose sensitive data or cause service disruption, the integrity of site configuration is compromised, which can indirectly affect security posture. Organizations running affected versions of the plugin risk unauthorized administrative changes that could facilitate spam, unauthorized access, or other malicious activities. The vulnerability is particularly impactful in environments where subscriber-level accounts are widely distributed or where user registration policies are critical to security.

Mitigation Recommendations

To mitigate CVE-2024-7721, organizations should immediately update the HTML5 Video Player – mp4 Video Player Plugin and Block to a patched version once available. In the absence of a patch, administrators should restrict Subscriber-level access or lower privileges from users who do not require it, minimizing the number of accounts that can exploit this vulnerability. Additionally, implement strict role-based access controls and monitor changes to plugin settings for unauthorized modifications. Consider disabling user registration temporarily if it is not needed or enforce additional verification mechanisms for new accounts. Web application firewalls (WAFs) can be configured to detect and block suspicious requests targeting the plugin’s configuration endpoints. Regular audits of WordPress user roles and plugin configurations will help detect exploitation attempts early. Finally, maintain comprehensive logging and alerting on configuration changes to enable rapid incident response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-08-12T21:19:24.582Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c1db7ef31ef0b5601bd

Added to database: 2/25/2026, 9:39:41 PM

Last enriched: 2/26/2026, 3:46:37 AM

Last updated: 2/26/2026, 7:38:20 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats