Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30885: CWE-306: Missing Authentication for Critical Function in WWBN AVideo

0
Medium
VulnerabilityCVE-2026-30885cvecve-2026-30885cwe-306cwe-862
Published: Mon Mar 09 2026 (03/09/2026, 22:35:59 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

WWBN AVideo is an open source video platform. Prior to 25.0, the /objects/playlistsFromUser.json.php endpoint returns all playlists for any user without requiring authentication or authorization. An unauthenticated attacker can enumerate user IDs and retrieve playlist information including playlist names, video IDs, and playlist status for any user on the platform. This vulnerability is fixed in 25.0.

AI-Powered Analysis

AILast updated: 03/09/2026, 23:04:03 UTC

Technical Analysis

CVE-2026-30885 identifies a missing authentication vulnerability in the WWBN AVideo open source video platform, specifically affecting versions prior to 25.0. The vulnerability exists in the /objects/playlistsFromUser.json.php endpoint, which returns all playlists associated with any user without requiring authentication or authorization. This means an unauthenticated attacker can enumerate user IDs and retrieve sensitive playlist information such as playlist names, video IDs, and playlist statuses. The root cause is a lack of access control enforcement on a critical function, categorized under CWE-306 (Missing Authentication for Critical Function) and CWE-862 (Missing Authorization). The vulnerability has a CVSS 4.0 base score of 5.5 (medium severity), reflecting that it is remotely exploitable without authentication or user interaction, but the impact is limited to confidentiality loss of playlist metadata without affecting integrity or availability. No known exploits have been reported in the wild as of the publication date. The issue was addressed and fixed in AVideo version 25.0 by implementing proper authentication and authorization checks on the affected endpoint. This vulnerability primarily exposes user playlist data, which could be leveraged for user enumeration, privacy violations, or reconnaissance by attackers targeting the platform or its users.

Potential Impact

The primary impact of CVE-2026-30885 is the unauthorized disclosure of user playlist information, including playlist names, video IDs, and statuses. This can lead to privacy violations for users of the platform, as attackers can gather detailed data about user activity and preferences without any authentication. While the vulnerability does not allow modification or deletion of data, the exposure of user-related metadata can facilitate targeted social engineering, user enumeration, or further attacks against the platform or its users. Organizations relying on WWBN AVideo for video hosting or streaming services may suffer reputational damage and loss of user trust if such data is leaked. Additionally, attackers could use the exposed information to map the platform’s user base and content structure, aiding in more sophisticated attacks. Although the vulnerability does not directly impact system integrity or availability, the confidentiality breach is significant for platforms handling sensitive or proprietary video content. The lack of authentication requirements also indicates potential gaps in the platform’s security posture that could be exploited in other ways.

Mitigation Recommendations

To mitigate CVE-2026-30885, organizations should immediately upgrade WWBN AVideo to version 25.0 or later, where the vulnerability has been fixed by enforcing authentication and authorization on the /objects/playlistsFromUser.json.php endpoint. Until the upgrade is applied, administrators should consider restricting access to the affected endpoint via network-level controls such as firewall rules or API gateways to limit exposure to trusted users only. Implementing strong authentication mechanisms (e.g., OAuth, API keys) and role-based access control (RBAC) on all API endpoints is critical to prevent unauthorized data access. Regularly audit and monitor API access logs to detect unusual or unauthorized requests targeting playlist data. Additionally, conduct a comprehensive security review of other API endpoints to ensure no similar missing authentication issues exist. Educate developers on secure coding practices to avoid missing authentication and authorization checks on critical functions. Finally, inform users about the potential privacy risks and encourage them to report any suspicious activity related to their accounts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-06T00:04:56.700Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69af4e6aea502d3aa8cf7ccf

Added to database: 3/9/2026, 10:49:14 PM

Last enriched: 3/9/2026, 11:04:03 PM

Last updated: 3/13/2026, 2:52:39 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses