Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34441: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in World Wide Broadcast Network AVideo

0
Medium
VulnerabilityCVE-2025-34441cvecve-2025-34441cwe-359
Published: Wed Dec 17 2025 (12/17/2025, 19:48:09 UTC)
Source: CVE Database V5
Vendor/Project: World Wide Broadcast Network
Product: AVideo

Description

AVideo versions prior to 20.0 expose sensitive user information through an unauthenticated public API endpoint. Responses include emails, usernames, administrative status, and last login times, enabling user enumeration and privacy violations.

AI-Powered Analysis

AILast updated: 12/17/2025, 19:59:27 UTC

Technical Analysis

CVE-2025-34441 is a vulnerability identified in the World Wide Broadcast Network's AVideo platform, affecting all versions prior to 20.0. The issue arises from an unauthenticated public API endpoint that returns sensitive user information including email addresses, usernames, administrative privileges, and last login timestamps. This exposure constitutes a CWE-359 weakness, where private personal information is accessible to unauthorized actors. The vulnerability allows attackers to enumerate users and gather data that can be leveraged for further attacks such as targeted phishing, social engineering, or privilege escalation attempts. The flaw does not require any authentication or user interaction, making exploitation straightforward. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low to low integrity and availability impacts (VC:L, VI:L, VA:L). No known exploits have been reported in the wild as of the publication date, but the exposure of administrative status information increases the risk profile. The vulnerability affects confidentiality primarily, with some impact on integrity and availability due to potential misuse of the exposed data. The lack of patch links suggests that remediation involves upgrading to version 20.0 or later, which presumably addresses the issue by securing the API endpoint. Organizations relying on AVideo for media streaming or broadcasting services should prioritize mitigation to prevent unauthorized data disclosure.

Potential Impact

For European organizations, this vulnerability poses a significant privacy risk by exposing personally identifiable information (PII) such as emails and usernames, which are protected under GDPR regulations. Unauthorized access to administrative status information can facilitate privilege escalation or targeted attacks against high-value accounts. The exposure of last login times can aid attackers in crafting timing-based social engineering attacks. Media companies, educational institutions, and broadcasters using AVideo are particularly vulnerable to reputational damage and regulatory penalties if user data is leaked. The ease of exploitation without authentication increases the likelihood of reconnaissance activities by malicious actors. While the vulnerability does not directly compromise system availability or integrity, the indirect effects of user enumeration and privacy violations can lead to broader security incidents. European organizations must consider the legal and compliance implications alongside the technical risks.

Mitigation Recommendations

To mitigate CVE-2025-34441, organizations should immediately upgrade AVideo installations to version 20.0 or later, where the vulnerability is addressed. If upgrading is not immediately feasible, restrict access to the vulnerable API endpoint by implementing network-level controls such as IP whitelisting or VPN access. Conduct thorough audits of API endpoints to identify and secure any other unauthenticated data exposures. Implement robust logging and monitoring to detect unusual access patterns indicative of enumeration attempts. Educate users and administrators about phishing risks that may arise from leaked information. Additionally, review and enforce strict access control policies within AVideo to minimize the impact of any data exposure. Engage with the vendor for official patches or workarounds and stay updated on any emerging exploits or advisories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.602Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694309ba0b6f32e62bf653d5

Added to database: 12/17/2025, 7:51:22 PM

Last enriched: 12/17/2025, 7:59:27 PM

Last updated: 12/18/2025, 3:32:12 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats