Meks Video Importer Vulnerability (Medium) – CVE-2024-38733

Meks Video Importer Vulnerability (Medium) – CVE-2024-38733

by | Feb 26, 2026 | Plugins

Attack Vectors

CVE-2024-38733 affects the WordPress plugin Meks Video Importer (slug: meks-video-importer) in versions up to and including 1.0.12. It is rated Medium severity with a CVSS score of 4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).

Because this issue is tied to missing authorization, an attacker can attempt to trigger the vulnerable function remotely over the network and perform an unauthorized action. This type of flaw is often attractive to attackers because it can be automated and does not require victim interaction (no clicks required).

Security Weakness

The underlying weakness is a missing capability (authorization) check on a plugin function in Meks Video Importer versions <= 1.0.12. In practical business terms, this means the plugin may not consistently verify that the requester is allowed to perform the action before executing it.

The result is a gap between your intended access rules (who should be allowed to do what) and what the plugin actually enforces in code—creating a pathway for unauthorized behavior.

Technical or Business Impacts

Even at Medium severity, missing authorization issues can create real business risk: unauthorized changes can disrupt content operations, erode trust in website integrity, and increase the burden on marketing and IT teams to investigate unexpected site behavior.

For regulated organizations and teams with compliance obligations, weaknesses like this can also raise concerns around access governance and change control—especially if an incident leads to questions about who initiated actions within WordPress.

Remediation: Update Meks Video Importer to version 1.0.13 or newer (patched). After updating, review WordPress user roles and audit recent administrative and plugin-related activity for unexpected changes. Reference: Wordfence vulnerability entry. CVE record: CVE-2024-38733.

Similar Attacks

Authorization and access-control gaps are a recurring theme in WordPress plugin incidents, where a missing or incorrect permission check enables actions that should be restricted. A well-known example is CVE-2019-9978 (Social Warfare), where insufficient controls in a plugin feature were leveraged to perform unauthorized behavior.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers