Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34441: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in World Wide Broadcast Network AVideo

0
Medium
VulnerabilityCVE-2025-34441cvecve-2025-34441cwe-359
Published: Wed Dec 17 2025 (12/17/2025, 19:48:09 UTC)
Source: CVE Database V5
Vendor/Project: World Wide Broadcast Network
Product: AVideo

Description

AVideo versions prior to 20.1 expose sensitive user information through an unauthenticated public API endpoint. Responses include emails, usernames, administrative status, and last login times, enabling user enumeration and privacy violations.

AI-Powered Analysis

AILast updated: 12/24/2025, 20:19:35 UTC

Technical Analysis

CVE-2025-34441 is a vulnerability identified in the World Wide Broadcast Network's AVideo platform, affecting all versions prior to 20.1. The core issue is an unauthenticated public API endpoint that returns sensitive user information without requiring any form of authentication or user interaction. The exposed data includes email addresses, usernames, administrative status flags, and last login timestamps. This data leakage constitutes a CWE-359 weakness, which is the exposure of private personal information to unauthorized actors. The vulnerability allows attackers to enumerate users, identify privileged accounts, and gather information useful for further targeted attacks such as phishing or credential stuffing. The CVSS 4.0 vector indicates the attack can be performed remotely over the network with low complexity, no privileges, and no user interaction required. The impact on confidentiality is significant due to the exposure of personal and administrative information, while integrity and availability impacts are limited but present due to potential follow-on attacks. No patches or exploits are currently documented, but the vulnerability is publicly known and documented as of December 2025. The lack of authentication on the API endpoint is a critical design flaw that undermines user privacy and security. Organizations using AVideo should consider this a priority vulnerability to address.

Potential Impact

For European organizations, the exposure of user emails, usernames, and administrative status can lead to multiple adverse outcomes. Privacy regulations such as GDPR impose strict requirements on protecting personal data; this vulnerability could lead to non-compliance and substantial fines if exploited. Attackers could leverage the exposed data to conduct targeted phishing campaigns, social engineering, or brute-force attacks against administrative accounts, potentially leading to unauthorized access or data breaches. The exposure of last login times can aid attackers in timing attacks or identifying active users. Organizations relying on AVideo for video content management or streaming services may face reputational damage if user data is leaked. Additionally, sectors with sensitive or regulated data, such as healthcare, education, or government entities using AVideo, are at heightened risk. The vulnerability does not directly allow system compromise but significantly lowers the barrier for further attacks, increasing the overall threat landscape.

Mitigation Recommendations

The primary mitigation is to upgrade AVideo installations to version 20.1 or later, where this vulnerability is resolved. Until an upgrade is possible, organizations should restrict access to the vulnerable API endpoint by implementing network-level controls such as IP whitelisting or VPN-only access. Deploying Web Application Firewalls (WAFs) with rules to detect and block requests to the exposed endpoint can reduce risk. Monitoring logs for unusual API requests or spikes in user enumeration attempts can provide early detection of exploitation attempts. Organizations should review and tighten access controls on administrative accounts, enforce strong authentication mechanisms, and consider multi-factor authentication to mitigate risks from credential-based attacks. Conducting user awareness training on phishing risks is also recommended. Finally, organizations should perform regular audits of their AVideo deployments and ensure that sensitive endpoints are not publicly accessible without proper authentication.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.602Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694309ba0b6f32e62bf653d5

Added to database: 12/17/2025, 7:51:22 PM

Last enriched: 12/24/2025, 8:19:35 PM

Last updated: 2/7/2026, 9:33:25 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats