CVE-2026-29093: CWE-287: Improper Authentication in WWBN AVideo
CVE-2026-29093 is a high-severity improper authentication vulnerability in WWBN AVideo versions prior to 24. 0. The official docker-compose. yml file exposes the memcached service on host port 11211 without any authentication, allowing unauthenticated attackers with network access to this port to read, modify, or flush session data. Since PHP sessions are stored in this memcached instance, attackers can hijack user sessions, impersonate administrators, or cause mass session destruction. The vulnerability requires network access to port 11211 but no user interaction or authentication. This issue was patched in version 24. 0 by removing or securing the exposed memcached service. Organizations running vulnerable versions with exposed memcached ports are at significant risk of account compromise and service disruption.
AI Analysis
Technical Summary
WWBN AVideo is an open-source video platform that, prior to version 24.0, included a critical security flaw related to improper authentication (CWE-287) and insecure configuration (CWE-668). The official docker-compose.yml configuration published the memcached service on host port 11211 bound to 0.0.0.0, making it accessible from any network interface without authentication. Memcached, by default, does not implement authentication, so any attacker who can reach this port can interact with the memcached instance. PHP sessions for AVideo users are stored in this memcached instance, meaning session data is stored in-memory and accessible via memcached commands. An attacker can read session data to hijack active sessions, modify session data to impersonate administrators or other users, or flush all sessions to cause denial of service by forcing users to re-authenticate. This vulnerability is exploitable remotely without any privileges or user interaction, though network access to port 11211 is required. The CVSS 3.1 score of 8.1 reflects the high impact on confidentiality, integrity, and availability, with a higher attack complexity due to the need for network access. The issue was addressed in version 24.0 by removing the exposed memcached port or securing it properly, preventing unauthorized access to session data.
Potential Impact
The vulnerability allows attackers to compromise user sessions, including those of administrators, leading to full account takeover and unauthorized access to sensitive video content and administrative functions. This can result in data breaches, unauthorized content manipulation, and disruption of service through mass session invalidation. Organizations using vulnerable versions of AVideo with exposed memcached ports risk significant operational disruption, loss of user trust, and potential regulatory consequences if user data is compromised. The ability to hijack sessions without authentication or user interaction makes this vulnerability particularly dangerous in environments where memcached is exposed to untrusted networks, such as public cloud deployments or misconfigured internal networks.
Mitigation Recommendations
Upgrade all WWBN AVideo instances to version 24.0 or later, which patches this vulnerability by securing or removing the exposed memcached port. If upgrading is not immediately possible, restrict network access to port 11211 using firewall rules or network segmentation to allow only trusted hosts to connect. Avoid exposing memcached services to public or untrusted networks. Consider configuring memcached to use SASL authentication or switch PHP session storage to a more secure backend that supports authentication and encryption. Regularly audit docker-compose and deployment configurations to ensure no sensitive services are exposed unintentionally. Monitor network traffic for unusual access to memcached ports and implement intrusion detection rules to alert on suspicious activity targeting memcached.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2026-29093: CWE-287: Improper Authentication in WWBN AVideo
Description
CVE-2026-29093 is a high-severity improper authentication vulnerability in WWBN AVideo versions prior to 24. 0. The official docker-compose. yml file exposes the memcached service on host port 11211 without any authentication, allowing unauthenticated attackers with network access to this port to read, modify, or flush session data. Since PHP sessions are stored in this memcached instance, attackers can hijack user sessions, impersonate administrators, or cause mass session destruction. The vulnerability requires network access to port 11211 but no user interaction or authentication. This issue was patched in version 24. 0 by removing or securing the exposed memcached service. Organizations running vulnerable versions with exposed memcached ports are at significant risk of account compromise and service disruption.
AI-Powered Analysis
Technical Analysis
WWBN AVideo is an open-source video platform that, prior to version 24.0, included a critical security flaw related to improper authentication (CWE-287) and insecure configuration (CWE-668). The official docker-compose.yml configuration published the memcached service on host port 11211 bound to 0.0.0.0, making it accessible from any network interface without authentication. Memcached, by default, does not implement authentication, so any attacker who can reach this port can interact with the memcached instance. PHP sessions for AVideo users are stored in this memcached instance, meaning session data is stored in-memory and accessible via memcached commands. An attacker can read session data to hijack active sessions, modify session data to impersonate administrators or other users, or flush all sessions to cause denial of service by forcing users to re-authenticate. This vulnerability is exploitable remotely without any privileges or user interaction, though network access to port 11211 is required. The CVSS 3.1 score of 8.1 reflects the high impact on confidentiality, integrity, and availability, with a higher attack complexity due to the need for network access. The issue was addressed in version 24.0 by removing the exposed memcached port or securing it properly, preventing unauthorized access to session data.
Potential Impact
The vulnerability allows attackers to compromise user sessions, including those of administrators, leading to full account takeover and unauthorized access to sensitive video content and administrative functions. This can result in data breaches, unauthorized content manipulation, and disruption of service through mass session invalidation. Organizations using vulnerable versions of AVideo with exposed memcached ports risk significant operational disruption, loss of user trust, and potential regulatory consequences if user data is compromised. The ability to hijack sessions without authentication or user interaction makes this vulnerability particularly dangerous in environments where memcached is exposed to untrusted networks, such as public cloud deployments or misconfigured internal networks.
Mitigation Recommendations
Upgrade all WWBN AVideo instances to version 24.0 or later, which patches this vulnerability by securing or removing the exposed memcached port. If upgrading is not immediately possible, restrict network access to port 11211 using firewall rules or network segmentation to allow only trusted hosts to connect. Avoid exposing memcached services to public or untrusted networks. Consider configuring memcached to use SASL authentication or switch PHP session storage to a more secure backend that supports authentication and encryption. Regularly audit docker-compose and deployment configurations to ensure no sensitive services are exposed unintentionally. Monitor network traffic for unusual access to memcached ports and implement intrusion detection rules to alert on suspicious activity targeting memcached.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-03T21:54:06.707Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69aa4a7bc48b3f10ffe32f87
Added to database: 3/6/2026, 3:31:07 AM
Last enriched: 3/6/2026, 3:45:22 AM
Last updated: 3/6/2026, 6:33:16 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.