Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33038: CWE-306: Missing Authentication for Critical Function in WWBN AVideo

0
High
VulnerabilityCVE-2026-33038cvecve-2026-33038cwe-306
Published: Fri Mar 20 2026 (03/20/2026, 05:35:56 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-33038 is a high-severity vulnerability in WWBN AVideo versions 25. 0 and below that allows unauthenticated attackers to take over the application during initial setup via the install/checkConfiguration. php endpoint. This endpoint performs critical functions such as database setup, admin account creation, and configuration file writing without authentication, relying solely on the presence of a configuration file to block reinstallation. Attackers can exploit uninitialized deployments to gain full administrative control by completing the installation with attacker-controlled credentials and database. The vulnerability has been fixed in version 26. 0. Exploitation requires network access to the endpoint but no user interaction or privileges. Organizations using affected versions on new or reset deployments are at significant risk of complete compromise. Mitigation involves upgrading to version 26.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:40:58 UTC

Technical Analysis

CVE-2026-33038 is a critical vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting WWBN AVideo, an open-source video platform. Versions 25.0 and earlier expose an unauthenticated POST endpoint at install/checkConfiguration.php, which performs full application initialization tasks including database setup, administrator account creation, and configuration file writing. The only protection mechanism is a check for the existence of the videos/configuration.php file; if this file is missing (i.e., the application is uninitialized), any remote attacker can invoke this endpoint to complete the installation process with attacker-chosen credentials and database parameters. This results in full administrative control over the application without any authentication or user interaction. The vulnerability arises because critical setup functions are exposed without authentication controls, violating secure deployment principles. The issue has been addressed in version 26.0 by presumably adding proper authentication or disabling reinstallation once configured. The CVSS v3.1 score is 8.1 (High), reflecting the network attack vector, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No known exploits are reported in the wild yet, but the vulnerability is straightforward to exploit on uninitialized or reset deployments.

Potential Impact

The impact of CVE-2026-33038 is severe for organizations deploying or reinstalling WWBN AVideo versions 25.0 and below. An attacker who can access the installation endpoint on an uninitialized deployment can fully compromise the application by creating an admin account and controlling the database. This leads to complete loss of confidentiality, integrity, and availability of the video platform, enabling data theft, content manipulation, service disruption, and potential lateral movement within the network. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely by any unauthenticated attacker with network access to the endpoint. Organizations relying on WWBN AVideo for video content delivery, especially those deploying new instances or resetting configurations, face significant risk of takeover. This can damage reputation, cause data breaches, and disrupt business operations. The lack of known exploits in the wild suggests limited current exploitation but also indicates the need for proactive mitigation before attackers develop exploits.

Mitigation Recommendations

1. Upgrade all WWBN AVideo installations to version 26.0 or later immediately, as this version contains the fix for this vulnerability. 2. For existing deployments, ensure that the videos/configuration.php file exists and is properly secured to prevent reinitialization via the install/checkConfiguration.php endpoint. 3. Restrict network access to the installation endpoint (install/checkConfiguration.php) using firewalls or web application firewalls (WAFs) to limit exposure to trusted administrators only. 4. Implement monitoring and alerting for any access attempts to the installation endpoint, especially POST requests, to detect potential exploitation attempts. 5. For deployments that require reinstallation, perform the process in isolated, secure environments to prevent unauthorized access during setup. 6. Review and harden server and application permissions to prevent unauthorized file creation or modification. 7. Educate deployment teams about the risks of exposing installation endpoints and enforce secure deployment procedures that include immediate configuration file creation and endpoint disabling post-installation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T18:10:50.210Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bd945ce32a4fbe5fbc7f7c

Added to database: 3/20/2026, 6:39:24 PM

Last enriched: 3/27/2026, 7:40:58 PM

Last updated: 5/1/2026, 12:48:32 PM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses