CVE-2026-27732: CWE-918: Server-Side Request Forgery (SSRF) in WWBN AVideo
WWBN AVideo is an open source video platform. Prior to version 22.0, the `aVideoEncoder.json.php` API endpoint accepts a `downloadURL` parameter and fetches the referenced resource server-side without proper validation or an allow-list. This allows authenticated users to trigger server-side requests to arbitrary URLs (including internal network endpoints). An authenticated attacker can leverage SSRF to interact with internal services and retrieve sensitive data (e.g., internal APIs, metadata services), potentially leading to further compromise depending on the deployment environment. This issue has been fixed in AVideo version 22.0.
AI Analysis
Technical Summary
WWBN AVideo, an open-source video platform, contains a Server-Side Request Forgery (SSRF) vulnerability identified as CVE-2026-27732, classified under CWE-918. The flaw resides in the aVideoEncoder.json.php API endpoint, which accepts a downloadURL parameter that is used to fetch external resources server-side. Prior to version 22.0, this parameter is not properly validated or restricted via an allow-list, allowing authenticated users to supply arbitrary URLs. This enables attackers to coerce the server into making HTTP requests to internal or external systems on their behalf. Such SSRF attacks can be leveraged to access internal services that are otherwise inaccessible externally, including internal APIs, metadata services, or administrative interfaces. Depending on the deployment environment, this can lead to sensitive data disclosure or serve as a pivot point for further network compromise. The vulnerability requires authentication but no additional privileges or user interaction, making exploitation relatively straightforward for legitimate users. The CVSS 4.0 base score is 8.6 (high severity), reflecting the significant confidentiality and integrity impact combined with ease of exploitation. No known exploits are currently reported in the wild. The vendor has addressed the issue in AVideo version 22.0 by implementing proper validation and allow-listing of URLs in the downloadURL parameter.
Potential Impact
The SSRF vulnerability allows authenticated attackers to make arbitrary server-side HTTP requests, potentially accessing sensitive internal services that are not exposed externally. This can lead to unauthorized disclosure of confidential information such as internal APIs, metadata services, or other protected resources. In some environments, SSRF can be chained with other vulnerabilities to escalate privileges or execute remote code, increasing the risk of full system compromise. Organizations running affected versions of AVideo may face data breaches, service disruptions, or lateral movement within their networks. Since the flaw requires only authentication, any compromised or malicious user account can be leveraged to exploit this vulnerability. The impact is particularly severe in cloud or containerized deployments where metadata services contain critical credentials or configuration data. Overall, this vulnerability poses a significant risk to confidentiality and integrity of organizational assets.
Mitigation Recommendations
1. Upgrade all AVideo instances to version 22.0 or later, where the vulnerability is patched. 2. If immediate upgrade is not feasible, restrict access to the aVideoEncoder.json.php API endpoint to trusted users only and monitor usage closely. 3. Implement network segmentation and firewall rules to limit the server's ability to make outbound requests to sensitive internal services or metadata endpoints. 4. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious SSRF patterns targeting the downloadURL parameter. 5. Conduct regular audits of user accounts and privileges to reduce the risk of compromised credentials being used for exploitation. 6. Review and harden internal services to require strong authentication and minimize sensitive data exposure. 7. Monitor logs for unusual server-side request activity originating from the AVideo server. 8. Educate administrators about SSRF risks and ensure secure coding practices for any custom integrations with AVideo.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Japan, South Korea, India, Brazil
CVE-2026-27732: CWE-918: Server-Side Request Forgery (SSRF) in WWBN AVideo
Description
WWBN AVideo is an open source video platform. Prior to version 22.0, the `aVideoEncoder.json.php` API endpoint accepts a `downloadURL` parameter and fetches the referenced resource server-side without proper validation or an allow-list. This allows authenticated users to trigger server-side requests to arbitrary URLs (including internal network endpoints). An authenticated attacker can leverage SSRF to interact with internal services and retrieve sensitive data (e.g., internal APIs, metadata services), potentially leading to further compromise depending on the deployment environment. This issue has been fixed in AVideo version 22.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
WWBN AVideo, an open-source video platform, contains a Server-Side Request Forgery (SSRF) vulnerability identified as CVE-2026-27732, classified under CWE-918. The flaw resides in the aVideoEncoder.json.php API endpoint, which accepts a downloadURL parameter that is used to fetch external resources server-side. Prior to version 22.0, this parameter is not properly validated or restricted via an allow-list, allowing authenticated users to supply arbitrary URLs. This enables attackers to coerce the server into making HTTP requests to internal or external systems on their behalf. Such SSRF attacks can be leveraged to access internal services that are otherwise inaccessible externally, including internal APIs, metadata services, or administrative interfaces. Depending on the deployment environment, this can lead to sensitive data disclosure or serve as a pivot point for further network compromise. The vulnerability requires authentication but no additional privileges or user interaction, making exploitation relatively straightforward for legitimate users. The CVSS 4.0 base score is 8.6 (high severity), reflecting the significant confidentiality and integrity impact combined with ease of exploitation. No known exploits are currently reported in the wild. The vendor has addressed the issue in AVideo version 22.0 by implementing proper validation and allow-listing of URLs in the downloadURL parameter.
Potential Impact
The SSRF vulnerability allows authenticated attackers to make arbitrary server-side HTTP requests, potentially accessing sensitive internal services that are not exposed externally. This can lead to unauthorized disclosure of confidential information such as internal APIs, metadata services, or other protected resources. In some environments, SSRF can be chained with other vulnerabilities to escalate privileges or execute remote code, increasing the risk of full system compromise. Organizations running affected versions of AVideo may face data breaches, service disruptions, or lateral movement within their networks. Since the flaw requires only authentication, any compromised or malicious user account can be leveraged to exploit this vulnerability. The impact is particularly severe in cloud or containerized deployments where metadata services contain critical credentials or configuration data. Overall, this vulnerability poses a significant risk to confidentiality and integrity of organizational assets.
Mitigation Recommendations
1. Upgrade all AVideo instances to version 22.0 or later, where the vulnerability is patched. 2. If immediate upgrade is not feasible, restrict access to the aVideoEncoder.json.php API endpoint to trusted users only and monitor usage closely. 3. Implement network segmentation and firewall rules to limit the server's ability to make outbound requests to sensitive internal services or metadata endpoints. 4. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious SSRF patterns targeting the downloadURL parameter. 5. Conduct regular audits of user accounts and privileges to reduce the risk of compromised credentials being used for exploitation. 6. Review and harden internal services to require strong authentication and minimize sensitive data exposure. 7. Monitor logs for unusual server-side request activity originating from the AVideo server. 8. Educate administrators about SSRF risks and ensure secure coding practices for any custom integrations with AVideo.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-23T18:37:14.789Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699e0f3fbe58cf853b290da4
Added to database: 2/24/2026, 8:51:11 PM
Last enriched: 3/4/2026, 6:50:41 PM
Last updated: 4/10/2026, 11:18:56 PM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.