Skip to main content

CVE-2025-49986: CWE-862 Missing Authorization in thanhtungtnt Video List Manager

Medium
VulnerabilityCVE-2025-49986cvecve-2025-49986cwe-862
Published: Fri Jun 20 2025 (06/20/2025, 15:04:10 UTC)
Source: CVE Database V5
Vendor/Project: thanhtungtnt
Product: Video List Manager

Description

Missing Authorization vulnerability in thanhtungtnt Video List Manager allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Video List Manager: from n/a through 1.7.

AI-Powered Analysis

AILast updated: 06/21/2025, 12:08:12 UTC

Technical Analysis

CVE-2025-49986 is a Missing Authorization vulnerability (CWE-862) identified in the thanhtungtnt Video List Manager product, affecting versions up to 1.7. This vulnerability arises because certain functionalities within the application are not properly constrained by Access Control Lists (ACLs), allowing unauthorized users to access or invoke functions that should require specific permissions. The vulnerability has a CVSS 3.1 base score of 5.3, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) reveals that the vulnerability is remotely exploitable over the network without any privileges or user interaction, with low attack complexity. The impact is limited to integrity loss, meaning unauthorized users can potentially modify or manipulate data or application state but cannot affect confidentiality or availability. There are no known exploits in the wild at the time of publication, and no patches or fixes have been linked yet. The vulnerability affects the Video List Manager software, which is used to manage and organize video content, likely in web or media management environments. The missing authorization check could allow attackers to perform unauthorized actions such as modifying video lists, altering metadata, or changing configurations, potentially leading to data integrity issues or unauthorized content manipulation. Since no authentication is required and no user interaction is needed, exploitation could be automated and performed remotely, increasing the risk if the software is exposed to the internet or untrusted networks. However, the lack of confidentiality and availability impact reduces the overall criticality of the vulnerability.

Potential Impact

For European organizations using thanhtungtnt Video List Manager, this vulnerability poses a risk primarily to data integrity within video content management systems. Unauthorized modification of video lists or metadata could disrupt content workflows, cause misinformation, or damage organizational reputation, especially for media companies, educational institutions, or marketing agencies relying on accurate video content management. While confidentiality and availability are not directly impacted, integrity violations could lead to downstream effects such as incorrect content distribution or compliance issues if video content is regulated. The ease of remote exploitation without authentication increases the threat level, particularly for organizations with publicly accessible instances of the software. However, the medium severity and absence of known exploits suggest a moderate immediate risk. Organizations with critical video content management needs should prioritize addressing this vulnerability to prevent potential unauthorized modifications that could affect operational integrity and trustworthiness of their media assets.

Mitigation Recommendations

1. Implement strict access control measures at the network level to restrict access to the Video List Manager interface, such as IP whitelisting or VPN-only access, to reduce exposure to unauthorized users. 2. Conduct a thorough review of the application's ACL configurations and enforce proper authorization checks on all sensitive functions, especially those related to modifying video lists or metadata. 3. Monitor application logs for unusual or unauthorized access patterns that could indicate exploitation attempts. 4. If possible, isolate the Video List Manager system within a segmented network zone to limit lateral movement in case of compromise. 5. Engage with the vendor or development team to obtain or develop patches addressing the missing authorization checks. 6. Until patches are available, consider disabling or restricting access to vulnerable functionalities or deploying web application firewalls (WAFs) with custom rules to detect and block unauthorized requests targeting the vulnerable endpoints. 7. Educate administrators and users about the risks and encourage prompt reporting of suspicious activity related to video content management systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-11T16:07:56.073Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68568e84aded773421b5aa07

Added to database: 6/21/2025, 10:50:44 AM

Last enriched: 6/21/2025, 12:08:12 PM

Last updated: 8/17/2025, 2:45:16 PM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats