CVE-2025-34441: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in World Wide Broadcast Network AVideo
AVideo versions prior to 20.1 expose sensitive user information through an unauthenticated public API endpoint. Responses include emails, usernames, administrative status, and last login times, enabling user enumeration and privacy violations.
AI Analysis
Technical Summary
CVE-2025-34441 is a vulnerability identified in the World Wide Broadcast Network's AVideo platform, affecting all versions prior to 20.1. The core issue is an unauthenticated public API endpoint that returns sensitive user information without requiring any form of authentication or user interaction. The exposed data includes email addresses, usernames, administrative status flags, and last login timestamps. This data leakage constitutes a CWE-359 weakness, which is the exposure of private personal information to unauthorized actors. The vulnerability allows attackers to enumerate users, identify privileged accounts, and gather information useful for further targeted attacks such as phishing or credential stuffing. The CVSS 4.0 vector indicates the attack can be performed remotely over the network with low complexity, no privileges, and no user interaction required. The impact on confidentiality is significant due to the exposure of personal and administrative information, while integrity and availability impacts are limited but present due to potential follow-on attacks. No patches or exploits are currently documented, but the vulnerability is publicly known and documented as of December 2025. The lack of authentication on the API endpoint is a critical design flaw that undermines user privacy and security. Organizations using AVideo should consider this a priority vulnerability to address.
Potential Impact
For European organizations, the exposure of user emails, usernames, and administrative status can lead to multiple adverse outcomes. Privacy regulations such as GDPR impose strict requirements on protecting personal data; this vulnerability could lead to non-compliance and substantial fines if exploited. Attackers could leverage the exposed data to conduct targeted phishing campaigns, social engineering, or brute-force attacks against administrative accounts, potentially leading to unauthorized access or data breaches. The exposure of last login times can aid attackers in timing attacks or identifying active users. Organizations relying on AVideo for video content management or streaming services may face reputational damage if user data is leaked. Additionally, sectors with sensitive or regulated data, such as healthcare, education, or government entities using AVideo, are at heightened risk. The vulnerability does not directly allow system compromise but significantly lowers the barrier for further attacks, increasing the overall threat landscape.
Mitigation Recommendations
The primary mitigation is to upgrade AVideo installations to version 20.1 or later, where this vulnerability is resolved. Until an upgrade is possible, organizations should restrict access to the vulnerable API endpoint by implementing network-level controls such as IP whitelisting or VPN-only access. Deploying Web Application Firewalls (WAFs) with rules to detect and block requests to the exposed endpoint can reduce risk. Monitoring logs for unusual API requests or spikes in user enumeration attempts can provide early detection of exploitation attempts. Organizations should review and tighten access controls on administrative accounts, enforce strong authentication mechanisms, and consider multi-factor authentication to mitigate risks from credential-based attacks. Conducting user awareness training on phishing risks is also recommended. Finally, organizations should perform regular audits of their AVideo deployments and ensure that sensitive endpoints are not publicly accessible without proper authentication.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-34441: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in World Wide Broadcast Network AVideo
Description
AVideo versions prior to 20.1 expose sensitive user information through an unauthenticated public API endpoint. Responses include emails, usernames, administrative status, and last login times, enabling user enumeration and privacy violations.
AI-Powered Analysis
Technical Analysis
CVE-2025-34441 is a vulnerability identified in the World Wide Broadcast Network's AVideo platform, affecting all versions prior to 20.1. The core issue is an unauthenticated public API endpoint that returns sensitive user information without requiring any form of authentication or user interaction. The exposed data includes email addresses, usernames, administrative status flags, and last login timestamps. This data leakage constitutes a CWE-359 weakness, which is the exposure of private personal information to unauthorized actors. The vulnerability allows attackers to enumerate users, identify privileged accounts, and gather information useful for further targeted attacks such as phishing or credential stuffing. The CVSS 4.0 vector indicates the attack can be performed remotely over the network with low complexity, no privileges, and no user interaction required. The impact on confidentiality is significant due to the exposure of personal and administrative information, while integrity and availability impacts are limited but present due to potential follow-on attacks. No patches or exploits are currently documented, but the vulnerability is publicly known and documented as of December 2025. The lack of authentication on the API endpoint is a critical design flaw that undermines user privacy and security. Organizations using AVideo should consider this a priority vulnerability to address.
Potential Impact
For European organizations, the exposure of user emails, usernames, and administrative status can lead to multiple adverse outcomes. Privacy regulations such as GDPR impose strict requirements on protecting personal data; this vulnerability could lead to non-compliance and substantial fines if exploited. Attackers could leverage the exposed data to conduct targeted phishing campaigns, social engineering, or brute-force attacks against administrative accounts, potentially leading to unauthorized access or data breaches. The exposure of last login times can aid attackers in timing attacks or identifying active users. Organizations relying on AVideo for video content management or streaming services may face reputational damage if user data is leaked. Additionally, sectors with sensitive or regulated data, such as healthcare, education, or government entities using AVideo, are at heightened risk. The vulnerability does not directly allow system compromise but significantly lowers the barrier for further attacks, increasing the overall threat landscape.
Mitigation Recommendations
The primary mitigation is to upgrade AVideo installations to version 20.1 or later, where this vulnerability is resolved. Until an upgrade is possible, organizations should restrict access to the vulnerable API endpoint by implementing network-level controls such as IP whitelisting or VPN-only access. Deploying Web Application Firewalls (WAFs) with rules to detect and block requests to the exposed endpoint can reduce risk. Monitoring logs for unusual API requests or spikes in user enumeration attempts can provide early detection of exploitation attempts. Organizations should review and tighten access controls on administrative accounts, enforce strong authentication mechanisms, and consider multi-factor authentication to mitigate risks from credential-based attacks. Conducting user awareness training on phishing risks is also recommended. Finally, organizations should perform regular audits of their AVideo deployments and ensure that sensitive endpoints are not publicly accessible without proper authentication.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.602Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694309ba0b6f32e62bf653d5
Added to database: 12/17/2025, 7:51:22 PM
Last enriched: 12/24/2025, 8:19:35 PM
Last updated: 2/6/2026, 2:09:05 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1972: Use of Default Credentials in Edimax BR-6208AC
MediumCVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumCVE-2025-32393: CWE-770: Allocation of Resources Without Limits or Throttling in Significant-Gravitas AutoGPT
HighCVE-2026-24302: CWE-284: Improper Access Control in Microsoft Azure ARC
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.