Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33294: CWE-918: Server-Side Request Forgery (SSRF) in WWBN AVideo

0
Medium
VulnerabilityCVE-2026-33294cvecve-2026-33294cwe-918
Published: Sun Mar 22 2026 (03/22/2026, 16:58:09 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

WWBN AVideo is an open source video platform. Prior to version 26.0, the BulkEmbed plugin's save endpoint (`plugin/BulkEmbed/save.json.php`) fetches user-supplied thumbnail URLs via `url_get_contents()` without SSRF protection. Unlike all six other URL-fetching endpoints in AVideo that were hardened with `isSSRFSafeURL()`, this code path was missed. An authenticated attacker can force the server to make HTTP requests to internal network resources and retrieve the responses by viewing the saved video thumbnail. Version 26.0 fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/29/2026, 19:50:29 UTC

Technical Analysis

WWBN AVideo is an open-source video platform that includes a BulkEmbed plugin allowing users to embed multiple videos with thumbnails. Prior to version 26.0, the BulkEmbed plugin's save endpoint (`plugin/BulkEmbed/save.json.php`) uses a function called `url_get_contents()` to fetch thumbnail images from user-supplied URLs. Unlike six other URL-fetching endpoints in AVideo, this endpoint lacks the `isSSRFSafeURL()` validation, which is designed to prevent Server-Side Request Forgery (SSRF) attacks. SSRF vulnerabilities allow attackers to coerce the server into making HTTP requests to arbitrary internal or external resources. In this case, an authenticated attacker can supply a crafted thumbnail URL that points to internal network resources, causing the server to fetch and expose the contents of those resources when the saved video thumbnail is viewed. This can lead to unauthorized internal network scanning, data leakage, and potentially facilitate further attacks against internal systems. The vulnerability is tracked as CVE-2026-33294 and is classified under CWE-918 (SSRF). It has a CVSS 3.1 base score of 5.0, indicating medium severity, with attack vector network, low attack complexity, requiring privileges (authentication), no user interaction, and partial confidentiality impact. No known exploits are currently reported in the wild. The issue is fixed in AVideo version 26.0 by adding the missing SSRF protection to the BulkEmbed plugin's save endpoint.

Potential Impact

The primary impact of this SSRF vulnerability is unauthorized internal network reconnaissance and potential data exposure. An attacker with valid credentials can exploit the flaw to make the server issue HTTP requests to internal services that are otherwise inaccessible externally. This can reveal sensitive information such as internal web applications, metadata services, or other network resources. While the vulnerability does not directly allow data modification or denial of service, the information gathered can facilitate further attacks, including privilege escalation or lateral movement within an organization’s network. Organizations running vulnerable versions of AVideo expose their internal infrastructure to risk, especially if the platform is accessible from the internet and user authentication is weak or compromised. The medium severity score reflects the moderate impact and the requirement for authentication, but the potential for internal network exposure makes this a significant concern for organizations relying on AVideo for video content management.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade WWBN AVideo to version 26.0 or later, where the SSRF protection is implemented in the BulkEmbed plugin. Until an upgrade is possible, administrators should restrict access to the BulkEmbed plugin’s save endpoint to trusted users only and monitor logs for unusual URL fetch requests. Network-level controls such as firewall rules can be applied to limit the server’s ability to make outbound HTTP requests to internal IP ranges, reducing the risk of SSRF exploitation. Additionally, implementing strict input validation and URL whitelisting for thumbnail URLs can help prevent malicious URLs from being processed. Regularly auditing user privileges and enforcing strong authentication mechanisms will reduce the likelihood of an attacker gaining the necessary access to exploit this vulnerability. Finally, monitoring for unusual internal network traffic originating from the AVideo server can help detect exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T18:55:47.427Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c02043f4197a8e3ba1f6d0

Added to database: 3/22/2026, 5:00:51 PM

Last enriched: 3/29/2026, 7:50:29 PM

Last updated: 5/7/2026, 4:27:25 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses