Impact
The vulnerability in VidoRev Extensions up to 2.9.9.9.9.9.5 stems from a missing capability check on the 'vidorev_import_single_video' AJAX action, permitting unauthenticated users to import arbitrary YouTube videos. This unauthorized data import can expose a site to unwanted or malicious content, exemplifying a classic missing authorization flaw (CWE-862).
Affected Systems
The flaw affects the WordPress plugin VidoRev Extensions distributed by beeteam368. All releases with versions up to and including 2.9.9.9.9.9.5 are susceptible. Sites employing this plugin and exposing the AJAX endpoint should evaluate their exposure.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate risk; the EPSS score is less than 1 %, reflecting a very low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is likely through the publicly reachable '/wp-admin/admin-ajax.php' endpoint; an attacker can simply send an unauthenticated HTTP request to trigger the import action, requiring no privileged credentials or complex setup.
OpenCVE Enrichment
EUVD