Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33492: CWE-384: Session Fixation in WWBN AVideo

0
High
VulnerabilityCVE-2026-33492cvecve-2026-33492cwe-384
Published: Mon Mar 23 2026 (03/23/2026, 15:25:27 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-33492 is a high-severity session fixation vulnerability in WWBN AVideo versions up to 26. 0. The vulnerability arises because the platform's _session_start() function accepts arbitrary session IDs via the PHPSESSID GET parameter, allowing attackers to fix a session ID before user authentication. Additionally, session regeneration is bypassed for certain blacklisted endpoints when requests originate from the same domain, and session regeneration is explicitly disabled during user login. This combination enables attackers to hijack authenticated sessions by forcing victims to use attacker-chosen session IDs. The vulnerability has a CVSS score of 7. 3, indicating high impact on confidentiality and integrity with low attack complexity but requiring some privileges and user interaction. A patch addressing this issue is available in commit 5647a94d79bf69a972a86653fe02144079948785. Organizations using affected versions should apply the patch promptly to prevent session hijacking attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 16:01:01 UTC

Technical Analysis

CVE-2026-33492 is a session fixation vulnerability affecting WWBN AVideo, an open-source video platform, in versions up to and including 26.0. The root cause is that the _session_start() function accepts session IDs passed via the PHPSESSID GET parameter without proper validation or regeneration, allowing an attacker to specify an arbitrary session ID. Normally, session fixation attacks are mitigated by regenerating session IDs upon authentication; however, in AVideo, session regeneration is explicitly disabled in the User::login() function. Furthermore, a session regeneration bypass exists for specific blacklisted endpoints when requests originate from the same domain, further weakening session management. This flaw enables an attacker to fix a victim's session ID before login, and once the victim authenticates, the attacker can hijack the authenticated session by using the known session ID. The vulnerability impacts confidentiality and integrity by allowing unauthorized access to user accounts and potentially sensitive video content. The CVSS 3.1 score of 7.3 reflects network attack vector, low complexity, requiring privileges and user interaction, with high confidentiality and integrity impact but no availability impact. The vulnerability was reserved on March 20, 2026, and published on March 23, 2026. A patch is available in commit 5647a94d79bf69a972a86653fe02144079948785, which presumably enforces proper session ID regeneration and disallows arbitrary session ID acceptance via GET parameters.

Potential Impact

The session fixation vulnerability allows attackers to hijack authenticated user sessions by forcing victims to use attacker-controlled session IDs. This can lead to unauthorized access to user accounts, including potentially sensitive video content and user data hosted on the AVideo platform. For organizations relying on AVideo for video streaming or content delivery, this can result in data breaches, privacy violations, and loss of user trust. Attackers may impersonate legitimate users, perform actions on their behalf, or access restricted content. Since the vulnerability affects session management, it compromises both confidentiality and integrity of user sessions. Although no direct availability impact is noted, the reputational damage and potential regulatory consequences from data exposure can be significant. The attack requires some user interaction (victim visiting a crafted URL) and privileges (low), but the ease of exploitation is relatively low complexity, making it a credible threat especially in environments with many users or public-facing deployments.

Mitigation Recommendations

Organizations should immediately upgrade WWBN AVideo to a version that includes the patch from commit 5647a94d79bf69a972a86653fe02144079948785 or later. If upgrading is not immediately possible, implement the following mitigations: 1) Disable acceptance of session IDs via GET parameters entirely to prevent attackers from setting arbitrary session IDs. 2) Enforce session ID regeneration upon every authentication event, including login, to prevent fixation. 3) Audit and remove any session regeneration bypasses, especially for blacklisted endpoints, ensuring consistent session management across all routes. 4) Implement secure cookie flags (HttpOnly, Secure, SameSite) to reduce session hijacking risks. 5) Monitor logs for suspicious session activity or repeated session ID reuse. 6) Educate users to avoid clicking on suspicious links that may contain session IDs. 7) Conduct regular security reviews of session management code to detect similar issues. These steps go beyond generic advice by focusing on session ID handling specifics and code-level fixes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-20T16:16:48.971Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c16032f4197a8e3b6f2c0c

Added to database: 3/23/2026, 3:45:54 PM

Last enriched: 3/23/2026, 4:01:01 PM

Last updated: 3/23/2026, 5:03:34 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses