Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33037: CWE-1188: Insecure Default Initialization of Resource in WWBN AVideo

0
High
VulnerabilityCVE-2026-33037cvecve-2026-33037cwe-1188
Published: Fri Mar 20 2026 (03/20/2026, 05:25:49 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

WWBN AVideo is an open source video platform. In versions 25.0 and below, the official Docker deployment files (docker-compose.yml, env.example) ship with the admin password set to "password", which is automatically used to seed the admin account during installation, meaning any instance deployed without overriding SYSTEM_ADMIN_PASSWORD is immediately vulnerable to trivial administrative takeover. No compensating controls exist: there is no forced password change on first login, no complexity validation, no default-password detection, and the password is hashed with weak MD5. Full admin access enables user data exposure, content manipulation, and potential remote code execution via file uploads and plugin management. The same insecure-default pattern extends to database credentials (avideo/avideo), compounding the risk. Exploitation depends on operators failing to change the default, a condition likely met in quick-start, demo, and automated deployments. This issue has been fixed in version 26.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 21:39:57 UTC

Technical Analysis

CVE-2026-33037 is a high-severity vulnerability in WWBN AVideo, an open-source video platform, affecting versions 25.0 and earlier. The root cause is insecure default initialization of critical credentials in the official Docker deployment files, specifically the admin password set to the static string "password" and database credentials set to "avideo/avideo". During installation, if operators do not override the SYSTEM_ADMIN_PASSWORD environment variable, the admin account is seeded with this weak password. There are no compensating controls such as forced password changes on first login, password complexity enforcement, or detection of default passwords. The admin password is hashed with MD5, a cryptographically weak algorithm, making offline attacks easier if hashes are obtained. Full administrative access gained through this vulnerability allows attackers to expose sensitive user data, manipulate video content, and potentially execute arbitrary code remotely by uploading malicious files or managing plugins. The vulnerability primarily affects deployments using the official Docker images without customization, such as quick-start setups, demos, or automated CI/CD pipelines. The issue was addressed in version 26.0 by removing insecure defaults and enforcing better credential management. The CVSS 3.1 score of 8.1 reflects network attack vector, high impact on confidentiality, integrity, and availability, no privileges or user interaction required, but with a high attack complexity due to needing to exploit default credentials. No known exploits are reported in the wild yet.

Potential Impact

Organizations running WWBN AVideo versions 25.0 and below with default Docker deployments are at high risk of complete administrative compromise. Attackers can gain full control over the platform, leading to exposure of sensitive user data, unauthorized content changes, and potential remote code execution. This can result in data breaches, reputational damage, service disruption, and potential lateral movement within the network if attackers leverage plugin management or file upload features. Automated or demo deployments that do not customize default credentials are especially vulnerable, increasing the likelihood of widespread exploitation in environments used for rapid testing or demonstration. The weak MD5 hashing of passwords further increases risk if credential hashes are leaked. The vulnerability undermines trust in the platform and can have severe consequences for organizations relying on AVideo for video hosting, streaming, or content delivery.

Mitigation Recommendations

Operators must immediately upgrade to WWBN AVideo version 26.0 or later, where this vulnerability is fixed. Until upgrade, deployments should never use the default SYSTEM_ADMIN_PASSWORD; instead, set a strong, unique admin password via environment variables before installation. Implement mandatory password complexity policies and enforce password changes on first login through custom scripts or configuration overrides. Replace MD5 password hashing with a stronger algorithm such as bcrypt or Argon2 if possible by patching or custom builds. Change default database credentials from "avideo/avideo" to strong, unique credentials and restrict database access to trusted networks only. Audit existing deployments for default credentials and reset compromised accounts immediately. Disable or tightly control file upload and plugin management features to limit potential remote code execution vectors. Incorporate automated checks in CI/CD pipelines to detect insecure default credentials before deployment. Monitor logs and network traffic for suspicious administrative access attempts. Educate administrators about the risks of default credentials and enforce secure deployment practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T18:10:50.210Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bdbd96e2bf98efc48d1059

Added to database: 3/20/2026, 9:35:18 PM

Last enriched: 3/20/2026, 9:39:57 PM

Last updated: 3/21/2026, 3:50:12 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses