CVE-2026-33039: CWE-918: Server-Side Request Forgery (SSRF) in WWBN AVideo
CVE-2026-33039 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in WWBN AVideo versions 25. 0 and below. The vulnerability arises because the proxy. php endpoint validates only the initial URL against internal/private networks, but fails to re-validate URLs in HTTP redirects. An attacker can exploit this by supplying a URL that responds with a redirect to internal services such as cloud metadata endpoints or RFC1918 addresses, allowing unauthorized access to sensitive internal resources. This flaw is fixed in version 26. 0. The vulnerability has a CVSS score of 8. 6, indicating a critical confidentiality impact without requiring authentication or user interaction. Organizations using affected AVideo versions should upgrade promptly and restrict network access to internal services from the application server to mitigate risk.
AI Analysis
Technical Summary
CVE-2026-33039 is a Server-Side Request Forgery (SSRF) vulnerability identified in the open-source video platform WWBN AVideo, specifically affecting versions 25.0 and earlier. The vulnerability exists in the plugin/LiveLinks/proxy.php endpoint, which is designed to fetch user-supplied URLs. The endpoint uses the isSSRFSafeURL() function to validate that the initial URL does not point to internal or private network addresses, aiming to prevent SSRF attacks. However, this validation only applies to the initial URL and does not extend to subsequent HTTP redirects. When the initial URL responds with an HTTP redirect via the Location header, the redirected URL is fetched using the fakeBrowser() function without undergoing re-validation. This oversight allows an attacker to craft a URL that first passes the initial check but then redirects to sensitive internal resources such as cloud metadata services or RFC1918 private IP addresses. Exploiting this vulnerability can enable attackers to access internal network services that should be inaccessible externally, potentially leaking sensitive information like cloud instance credentials or internal APIs. The issue is resolved in version 26.0 of AVideo by ensuring proper validation of redirect targets. The vulnerability has a CVSS 3.1 score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N), indicating it is remotely exploitable without authentication or user interaction, causes a complete confidentiality breach, but does not affect integrity or availability. No known exploits are currently reported in the wild.
Potential Impact
The primary impact of CVE-2026-33039 is the unauthorized disclosure of sensitive internal information due to SSRF exploitation. Attackers can leverage this vulnerability to access internal services that are normally protected behind firewalls, such as cloud metadata endpoints that may contain credentials, tokens, or configuration data. This can lead to further compromise of cloud infrastructure or internal networks. Since the vulnerability does not require authentication or user interaction, it can be exploited remotely by unauthenticated attackers. Organizations running vulnerable versions of AVideo risk exposure of confidential data, which can facilitate lateral movement, privilege escalation, or data exfiltration. The scope of impact is significant for any deployment exposing the vulnerable endpoint to untrusted users or the internet. However, the vulnerability does not directly affect system integrity or availability, limiting the impact to confidentiality breaches. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially given the public disclosure and high CVSS score.
Mitigation Recommendations
1. Upgrade WWBN AVideo to version 26.0 or later, where the vulnerability is fixed by proper validation of redirect URLs. 2. Implement network segmentation and firewall rules to restrict the AVideo server's outbound access to internal services, especially cloud metadata endpoints and RFC1918 address ranges. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious SSRF patterns or unusual redirect chains targeting internal IPs. 4. Monitor application logs for unusual proxy.php requests that include URLs causing redirects to internal addresses. 5. If immediate upgrade is not possible, consider disabling or restricting access to the vulnerable proxy.php endpoint to trusted users only. 6. Conduct regular security assessments and penetration testing focusing on SSRF vectors in web applications. 7. Educate developers and administrators about SSRF risks and secure URL validation techniques, including validating all redirect targets, not just initial URLs.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands, India, Brazil
CVE-2026-33039: CWE-918: Server-Side Request Forgery (SSRF) in WWBN AVideo
Description
CVE-2026-33039 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in WWBN AVideo versions 25. 0 and below. The vulnerability arises because the proxy. php endpoint validates only the initial URL against internal/private networks, but fails to re-validate URLs in HTTP redirects. An attacker can exploit this by supplying a URL that responds with a redirect to internal services such as cloud metadata endpoints or RFC1918 addresses, allowing unauthorized access to sensitive internal resources. This flaw is fixed in version 26. 0. The vulnerability has a CVSS score of 8. 6, indicating a critical confidentiality impact without requiring authentication or user interaction. Organizations using affected AVideo versions should upgrade promptly and restrict network access to internal services from the application server to mitigate risk.
AI-Powered Analysis
Technical Analysis
CVE-2026-33039 is a Server-Side Request Forgery (SSRF) vulnerability identified in the open-source video platform WWBN AVideo, specifically affecting versions 25.0 and earlier. The vulnerability exists in the plugin/LiveLinks/proxy.php endpoint, which is designed to fetch user-supplied URLs. The endpoint uses the isSSRFSafeURL() function to validate that the initial URL does not point to internal or private network addresses, aiming to prevent SSRF attacks. However, this validation only applies to the initial URL and does not extend to subsequent HTTP redirects. When the initial URL responds with an HTTP redirect via the Location header, the redirected URL is fetched using the fakeBrowser() function without undergoing re-validation. This oversight allows an attacker to craft a URL that first passes the initial check but then redirects to sensitive internal resources such as cloud metadata services or RFC1918 private IP addresses. Exploiting this vulnerability can enable attackers to access internal network services that should be inaccessible externally, potentially leaking sensitive information like cloud instance credentials or internal APIs. The issue is resolved in version 26.0 of AVideo by ensuring proper validation of redirect targets. The vulnerability has a CVSS 3.1 score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N), indicating it is remotely exploitable without authentication or user interaction, causes a complete confidentiality breach, but does not affect integrity or availability. No known exploits are currently reported in the wild.
Potential Impact
The primary impact of CVE-2026-33039 is the unauthorized disclosure of sensitive internal information due to SSRF exploitation. Attackers can leverage this vulnerability to access internal services that are normally protected behind firewalls, such as cloud metadata endpoints that may contain credentials, tokens, or configuration data. This can lead to further compromise of cloud infrastructure or internal networks. Since the vulnerability does not require authentication or user interaction, it can be exploited remotely by unauthenticated attackers. Organizations running vulnerable versions of AVideo risk exposure of confidential data, which can facilitate lateral movement, privilege escalation, or data exfiltration. The scope of impact is significant for any deployment exposing the vulnerable endpoint to untrusted users or the internet. However, the vulnerability does not directly affect system integrity or availability, limiting the impact to confidentiality breaches. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially given the public disclosure and high CVSS score.
Mitigation Recommendations
1. Upgrade WWBN AVideo to version 26.0 or later, where the vulnerability is fixed by proper validation of redirect URLs. 2. Implement network segmentation and firewall rules to restrict the AVideo server's outbound access to internal services, especially cloud metadata endpoints and RFC1918 address ranges. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious SSRF patterns or unusual redirect chains targeting internal IPs. 4. Monitor application logs for unusual proxy.php requests that include URLs causing redirects to internal addresses. 5. If immediate upgrade is not possible, consider disabling or restricting access to the vulnerable proxy.php endpoint to trusted users only. 6. Conduct regular security assessments and penetration testing focusing on SSRF vectors in web applications. 7. Educate developers and administrators about SSRF risks and secure URL validation techniques, including validating all redirect targets, not just initial URLs.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T18:10:50.210Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bce490e32a4fbe5f33889a
Added to database: 3/20/2026, 6:09:20 AM
Last enriched: 3/20/2026, 6:24:28 AM
Last updated: 3/20/2026, 7:30:37 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.