CVE-2026-33294: CWE-918: Server-Side Request Forgery (SSRF) in WWBN AVideo
WWBN AVideo is an open source video platform. Prior to version 26.0, the BulkEmbed plugin's save endpoint (`plugin/BulkEmbed/save.json.php`) fetches user-supplied thumbnail URLs via `url_get_contents()` without SSRF protection. Unlike all six other URL-fetching endpoints in AVideo that were hardened with `isSSRFSafeURL()`, this code path was missed. An authenticated attacker can force the server to make HTTP requests to internal network resources and retrieve the responses by viewing the saved video thumbnail. Version 26.0 fixes the issue.
AI Analysis
Technical Summary
WWBN AVideo is an open-source video platform that includes a BulkEmbed plugin allowing users to embed multiple videos with thumbnails. Prior to version 26.0, the BulkEmbed plugin's save endpoint (`plugin/BulkEmbed/save.json.php`) uses a function called `url_get_contents()` to fetch thumbnail images from user-supplied URLs. Unlike six other URL-fetching endpoints in AVideo, this endpoint lacks the `isSSRFSafeURL()` validation, which is designed to prevent Server-Side Request Forgery (SSRF) attacks. SSRF vulnerabilities allow attackers to coerce the server into making HTTP requests to arbitrary internal or external resources. In this case, an authenticated attacker can supply a crafted thumbnail URL that points to internal network resources, causing the server to fetch and expose the contents of those resources when the saved video thumbnail is viewed. This can lead to unauthorized internal network scanning, data leakage, and potentially facilitate further attacks against internal systems. The vulnerability is tracked as CVE-2026-33294 and is classified under CWE-918 (SSRF). It has a CVSS 3.1 base score of 5.0, indicating medium severity, with attack vector network, low attack complexity, requiring privileges (authentication), no user interaction, and partial confidentiality impact. No known exploits are currently reported in the wild. The issue is fixed in AVideo version 26.0 by adding the missing SSRF protection to the BulkEmbed plugin's save endpoint.
Potential Impact
The primary impact of this SSRF vulnerability is unauthorized internal network reconnaissance and potential data exposure. An attacker with valid credentials can exploit the flaw to make the server issue HTTP requests to internal services that are otherwise inaccessible externally. This can reveal sensitive information such as internal web applications, metadata services, or other network resources. While the vulnerability does not directly allow data modification or denial of service, the information gathered can facilitate further attacks, including privilege escalation or lateral movement within an organization’s network. Organizations running vulnerable versions of AVideo expose their internal infrastructure to risk, especially if the platform is accessible from the internet and user authentication is weak or compromised. The medium severity score reflects the moderate impact and the requirement for authentication, but the potential for internal network exposure makes this a significant concern for organizations relying on AVideo for video content management.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade WWBN AVideo to version 26.0 or later, where the SSRF protection is implemented in the BulkEmbed plugin. Until an upgrade is possible, administrators should restrict access to the BulkEmbed plugin’s save endpoint to trusted users only and monitor logs for unusual URL fetch requests. Network-level controls such as firewall rules can be applied to limit the server’s ability to make outbound HTTP requests to internal IP ranges, reducing the risk of SSRF exploitation. Additionally, implementing strict input validation and URL whitelisting for thumbnail URLs can help prevent malicious URLs from being processed. Regularly auditing user privileges and enforcing strong authentication mechanisms will reduce the likelihood of an attacker gaining the necessary access to exploit this vulnerability. Finally, monitoring for unusual internal network traffic originating from the AVideo server can help detect exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Japan, India, Brazil
CVE-2026-33294: CWE-918: Server-Side Request Forgery (SSRF) in WWBN AVideo
Description
WWBN AVideo is an open source video platform. Prior to version 26.0, the BulkEmbed plugin's save endpoint (`plugin/BulkEmbed/save.json.php`) fetches user-supplied thumbnail URLs via `url_get_contents()` without SSRF protection. Unlike all six other URL-fetching endpoints in AVideo that were hardened with `isSSRFSafeURL()`, this code path was missed. An authenticated attacker can force the server to make HTTP requests to internal network resources and retrieve the responses by viewing the saved video thumbnail. Version 26.0 fixes the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
WWBN AVideo is an open-source video platform that includes a BulkEmbed plugin allowing users to embed multiple videos with thumbnails. Prior to version 26.0, the BulkEmbed plugin's save endpoint (`plugin/BulkEmbed/save.json.php`) uses a function called `url_get_contents()` to fetch thumbnail images from user-supplied URLs. Unlike six other URL-fetching endpoints in AVideo, this endpoint lacks the `isSSRFSafeURL()` validation, which is designed to prevent Server-Side Request Forgery (SSRF) attacks. SSRF vulnerabilities allow attackers to coerce the server into making HTTP requests to arbitrary internal or external resources. In this case, an authenticated attacker can supply a crafted thumbnail URL that points to internal network resources, causing the server to fetch and expose the contents of those resources when the saved video thumbnail is viewed. This can lead to unauthorized internal network scanning, data leakage, and potentially facilitate further attacks against internal systems. The vulnerability is tracked as CVE-2026-33294 and is classified under CWE-918 (SSRF). It has a CVSS 3.1 base score of 5.0, indicating medium severity, with attack vector network, low attack complexity, requiring privileges (authentication), no user interaction, and partial confidentiality impact. No known exploits are currently reported in the wild. The issue is fixed in AVideo version 26.0 by adding the missing SSRF protection to the BulkEmbed plugin's save endpoint.
Potential Impact
The primary impact of this SSRF vulnerability is unauthorized internal network reconnaissance and potential data exposure. An attacker with valid credentials can exploit the flaw to make the server issue HTTP requests to internal services that are otherwise inaccessible externally. This can reveal sensitive information such as internal web applications, metadata services, or other network resources. While the vulnerability does not directly allow data modification or denial of service, the information gathered can facilitate further attacks, including privilege escalation or lateral movement within an organization’s network. Organizations running vulnerable versions of AVideo expose their internal infrastructure to risk, especially if the platform is accessible from the internet and user authentication is weak or compromised. The medium severity score reflects the moderate impact and the requirement for authentication, but the potential for internal network exposure makes this a significant concern for organizations relying on AVideo for video content management.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade WWBN AVideo to version 26.0 or later, where the SSRF protection is implemented in the BulkEmbed plugin. Until an upgrade is possible, administrators should restrict access to the BulkEmbed plugin’s save endpoint to trusted users only and monitor logs for unusual URL fetch requests. Network-level controls such as firewall rules can be applied to limit the server’s ability to make outbound HTTP requests to internal IP ranges, reducing the risk of SSRF exploitation. Additionally, implementing strict input validation and URL whitelisting for thumbnail URLs can help prevent malicious URLs from being processed. Regularly auditing user privileges and enforcing strong authentication mechanisms will reduce the likelihood of an attacker gaining the necessary access to exploit this vulnerability. Finally, monitoring for unusual internal network traffic originating from the AVideo server can help detect exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-18T18:55:47.427Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c02043f4197a8e3ba1f6d0
Added to database: 3/22/2026, 5:00:51 PM
Last enriched: 3/29/2026, 7:50:29 PM
Last updated: 5/7/2026, 4:27:25 AM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.