Description
The All-in-One Video Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `ajax_callback_create_bunny_stream_video`, `ajax_callback_get_bunny_stream_video`, and `ajax_callback_delete_bunny_stream_video` functions in all versions up to, and including, 4.6.4. This makes it possible for unauthenticated attackers to create and delete videos on the Bunny Stream CDN associated with the victim's account, provided they can obtain a valid nonce which is exposed in public player templates.
Published: 2026-01-23
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized creation and deletion of Bunny Stream videos
Action: Patch or Mitigate
AI Analysis

Impact

The All‑In‑One Video Gallery plugin for WordPress contains a missing capability check in three AJAX callback functions – one that creates, one that fetches, and one that deletes media objects on the Bunny Stream CDN. Because the plugin does not verify whether the requester has the proper WordPress role, an attacker can submit a request that triggers any of these callbacks and cause a new video to be uploaded to the victim’s Bunny account or an existing video to be removed. The functions rely on a nonce for protection, but the nonce is embedded in public player templates and therefore can be obtained by an unauthenticated user.

Affected Systems

This issue affects all installations of the plugin up to and including version 4.6.4. Any WordPress site running the All‑In‑One Video Gallery on those versions – regardless of the WordPress theme or additional plugins – is potentially vulnerable. The risk is limited to sites that use the Bunny Stream CDN integration, because the attacker would need a valid Bearer token that normally belongs to the site owner. If the site is not using Bunny Stream, the vulnerability does not expose additional risk beyond a nominal denial of service on the CDN side.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity. The EPSS shows a very low likelihood of exploitation – the probability is below 1% – and the flaw is not listed in CISA’s KEV catalog, further supporting the low current threat level. Nonetheless, the exposure of an operational nonce and the absence of an authorization check create a clear path for an unauthenticated attacker to alter data in a third‑party service, potentially leading to content loss or malicious content injection. Therefore, mitigation should be pursued before a broader vulnerability assessment or regulatory compliance review extends the risk window.

Generated by OpenCVE AI on April 21, 2026 at 00:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the All‑In‑One Video Gallery plugin to the most recent version that includes a fix for the missing capability check.
  • Block unauthenticated POST requests to the AJAX endpoints for Bunny Stream video creation, retrieval, and deletion by configuring the web server or a web‑application firewall to allow those actions only for authenticated sessions.
  • Remove the publicly exposed nonce from the player templates or modify the plugin so the nonce is generated server‑side after authentication to prevent unauthorized request crafting.

Generated by OpenCVE AI on April 21, 2026 at 00:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Plugins360
Plugins360 all-in-one Video Gallery
Wordpress
Wordpress wordpress
Vendors & Products Plugins360
Plugins360 all-in-one Video Gallery
Wordpress
Wordpress wordpress

Fri, 23 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 17:45:00 +0000

Type Values Removed Values Added
Description The All-in-One Video Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `ajax_callback_create_bunny_stream_video`, `ajax_callback_get_bunny_stream_video`, and `ajax_callback_delete_bunny_stream_video` functions in all versions up to, and including, 4.6.4. This makes it possible for unauthenticated attackers to create and delete videos on the Bunny Stream CDN associated with the victim's account, provided they can obtain a valid nonce which is exposed in public player templates.
Title All-in-One Video Gallery <= 4.6.4 - Missing Authorization to Unauthenticated Bunny Stream Video Creation/Deletion
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}


Subscriptions

Plugins360 All-in-one Video Gallery
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:19:20.636Z

Reserved: 2025-12-19T03:58:17.450Z

Link: CVE-2025-14947

cve-icon Vulnrichment

Updated: 2026-01-23T18:20:30.919Z

cve-icon NVD

Status : Deferred

Published: 2026-01-23T18:16:02.070

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14947

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T00:30:22Z

Weaknesses