CVE-2025-49986: CWE-862 Missing Authorization in thanhtungtnt Video List Manager
Missing Authorization vulnerability in thanhtungtnt Video List Manager allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Video List Manager: from n/a through 1.7.
AI Analysis
Technical Summary
CVE-2025-49986 is a Missing Authorization vulnerability (CWE-862) identified in the thanhtungtnt Video List Manager product, affecting versions up to 1.7. This vulnerability arises because certain functionalities within the application are not properly constrained by Access Control Lists (ACLs), allowing unauthorized users to access or invoke functions that should require specific permissions. The vulnerability has a CVSS 3.1 base score of 5.3, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) reveals that the vulnerability is remotely exploitable over the network without any privileges or user interaction, with low attack complexity. The impact is limited to integrity loss, meaning unauthorized users can potentially modify or manipulate data or application state but cannot affect confidentiality or availability. There are no known exploits in the wild at the time of publication, and no patches or fixes have been linked yet. The vulnerability affects the Video List Manager software, which is used to manage and organize video content, likely in web or media management environments. The missing authorization check could allow attackers to perform unauthorized actions such as modifying video lists, altering metadata, or changing configurations, potentially leading to data integrity issues or unauthorized content manipulation. Since no authentication is required and no user interaction is needed, exploitation could be automated and performed remotely, increasing the risk if the software is exposed to the internet or untrusted networks. However, the lack of confidentiality and availability impact reduces the overall criticality of the vulnerability.
Potential Impact
For European organizations using thanhtungtnt Video List Manager, this vulnerability poses a risk primarily to data integrity within video content management systems. Unauthorized modification of video lists or metadata could disrupt content workflows, cause misinformation, or damage organizational reputation, especially for media companies, educational institutions, or marketing agencies relying on accurate video content management. While confidentiality and availability are not directly impacted, integrity violations could lead to downstream effects such as incorrect content distribution or compliance issues if video content is regulated. The ease of remote exploitation without authentication increases the threat level, particularly for organizations with publicly accessible instances of the software. However, the medium severity and absence of known exploits suggest a moderate immediate risk. Organizations with critical video content management needs should prioritize addressing this vulnerability to prevent potential unauthorized modifications that could affect operational integrity and trustworthiness of their media assets.
Mitigation Recommendations
1. Implement strict access control measures at the network level to restrict access to the Video List Manager interface, such as IP whitelisting or VPN-only access, to reduce exposure to unauthorized users. 2. Conduct a thorough review of the application's ACL configurations and enforce proper authorization checks on all sensitive functions, especially those related to modifying video lists or metadata. 3. Monitor application logs for unusual or unauthorized access patterns that could indicate exploitation attempts. 4. If possible, isolate the Video List Manager system within a segmented network zone to limit lateral movement in case of compromise. 5. Engage with the vendor or development team to obtain or develop patches addressing the missing authorization checks. 6. Until patches are available, consider disabling or restricting access to vulnerable functionalities or deploying web application firewalls (WAFs) with custom rules to detect and block unauthorized requests targeting the vulnerable endpoints. 7. Educate administrators and users about the risks and encourage prompt reporting of suspicious activity related to video content management systems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-49986: CWE-862 Missing Authorization in thanhtungtnt Video List Manager
Description
Missing Authorization vulnerability in thanhtungtnt Video List Manager allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Video List Manager: from n/a through 1.7.
AI-Powered Analysis
Technical Analysis
CVE-2025-49986 is a Missing Authorization vulnerability (CWE-862) identified in the thanhtungtnt Video List Manager product, affecting versions up to 1.7. This vulnerability arises because certain functionalities within the application are not properly constrained by Access Control Lists (ACLs), allowing unauthorized users to access or invoke functions that should require specific permissions. The vulnerability has a CVSS 3.1 base score of 5.3, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) reveals that the vulnerability is remotely exploitable over the network without any privileges or user interaction, with low attack complexity. The impact is limited to integrity loss, meaning unauthorized users can potentially modify or manipulate data or application state but cannot affect confidentiality or availability. There are no known exploits in the wild at the time of publication, and no patches or fixes have been linked yet. The vulnerability affects the Video List Manager software, which is used to manage and organize video content, likely in web or media management environments. The missing authorization check could allow attackers to perform unauthorized actions such as modifying video lists, altering metadata, or changing configurations, potentially leading to data integrity issues or unauthorized content manipulation. Since no authentication is required and no user interaction is needed, exploitation could be automated and performed remotely, increasing the risk if the software is exposed to the internet or untrusted networks. However, the lack of confidentiality and availability impact reduces the overall criticality of the vulnerability.
Potential Impact
For European organizations using thanhtungtnt Video List Manager, this vulnerability poses a risk primarily to data integrity within video content management systems. Unauthorized modification of video lists or metadata could disrupt content workflows, cause misinformation, or damage organizational reputation, especially for media companies, educational institutions, or marketing agencies relying on accurate video content management. While confidentiality and availability are not directly impacted, integrity violations could lead to downstream effects such as incorrect content distribution or compliance issues if video content is regulated. The ease of remote exploitation without authentication increases the threat level, particularly for organizations with publicly accessible instances of the software. However, the medium severity and absence of known exploits suggest a moderate immediate risk. Organizations with critical video content management needs should prioritize addressing this vulnerability to prevent potential unauthorized modifications that could affect operational integrity and trustworthiness of their media assets.
Mitigation Recommendations
1. Implement strict access control measures at the network level to restrict access to the Video List Manager interface, such as IP whitelisting or VPN-only access, to reduce exposure to unauthorized users. 2. Conduct a thorough review of the application's ACL configurations and enforce proper authorization checks on all sensitive functions, especially those related to modifying video lists or metadata. 3. Monitor application logs for unusual or unauthorized access patterns that could indicate exploitation attempts. 4. If possible, isolate the Video List Manager system within a segmented network zone to limit lateral movement in case of compromise. 5. Engage with the vendor or development team to obtain or develop patches addressing the missing authorization checks. 6. Until patches are available, consider disabling or restricting access to vulnerable functionalities or deploying web application firewalls (WAFs) with custom rules to detect and block unauthorized requests targeting the vulnerable endpoints. 7. Educate administrators and users about the risks and encourage prompt reporting of suspicious activity related to video content management systems.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-11T16:07:56.073Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68568e84aded773421b5aa07
Added to database: 6/21/2025, 10:50:44 AM
Last enriched: 6/21/2025, 12:08:12 PM
Last updated: 8/17/2025, 2:45:16 PM
Views: 20
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.