CVE-2026-33649: CWE-352: Cross-Site Request Forgery (CSRF) in WWBN AVideo
CVE-2026-33649 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting WWBN AVideo versions up to 26. 0. The vulnerability exists because the setPermission. json. php endpoint accepts GET requests to change user group permissions without CSRF token validation. Additionally, the application sets session cookies with SameSite=None, allowing cross-site requests to carry session cookies. An unauthenticated attacker can exploit this by crafting a malicious page containing image tags that trigger permission changes when visited by an admin user. This leads to escalation of privileges, granting the attacker near-admin access. No patches are currently available, and no known exploits have been observed in the wild. Organizations using affected versions should urgently implement mitigations to prevent exploitation.
AI Analysis
Technical Summary
WWBN AVideo, an open-source video platform, suffers from a critical CSRF vulnerability (CVE-2026-33649) in versions up to and including 26.0. The vulnerability resides in the plugin/Permissions/setPermission.json.php endpoint, which accepts GET parameters to perform state-changing operations that modify user group permissions. Crucially, this endpoint lacks any CSRF token validation, violating best practices for preventing unauthorized state changes via cross-site requests. Compounding the issue, the application explicitly sets session cookies with the attribute SameSite=None, which allows cookies to be sent with cross-origin requests, thereby enabling CSRF attacks. An attacker can exploit this by crafting a malicious webpage containing <img> tags that issue GET requests to the vulnerable endpoint. When an administrator visits this malicious page, the browser sends the admin's session cookie along with the GET request, silently modifying permissions to grant the attacker’s user group elevated privileges. This effectively escalates the attacker to near-admin access without authentication or user interaction beyond visiting the malicious page. The vulnerability has a CVSS 3.1 score of 8.1, reflecting its high impact on confidentiality and integrity. As of the publication date, no patches or fixes have been released, and no active exploits have been reported. The vulnerability highlights a critical design flaw in permission management and session cookie handling within AVideo.
Potential Impact
The impact of CVE-2026-33649 is significant for organizations using WWBN AVideo versions 26.0 and earlier. Successful exploitation allows an unauthenticated attacker to escalate privileges by silently modifying user group permissions through CSRF attacks. This can lead to near-administrative access, enabling the attacker to control video content, user management, and potentially deploy further malicious actions within the platform. The confidentiality and integrity of the platform’s data are severely compromised, as attackers can manipulate permissions and access sensitive information or disrupt service operations. Given the lack of authentication and the ease of exploitation via a simple visit to a malicious webpage, the threat surface is broad. Organizations relying on AVideo for video hosting, streaming, or content management face risks of unauthorized access, data leakage, and operational disruption. The absence of patches increases exposure time, making proactive mitigation critical. Additionally, the explicit use of SameSite=None on session cookies exacerbates the risk by facilitating cross-origin requests that carry authentication tokens.
Mitigation Recommendations
Until an official patch is released, organizations should implement several specific mitigations: 1) Restrict administrative access to trusted networks or VPNs to reduce exposure to external CSRF attacks. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests to the setPermission.json.php endpoint, especially those originating from external or untrusted domains. 3) Disable or limit the use of SameSite=None on session cookies if possible, or configure cookies with SameSite=Lax or Strict to prevent cross-site requests from carrying session tokens. 4) Educate administrators to avoid visiting untrusted websites while logged into the AVideo admin interface. 5) Monitor logs for unusual permission changes or access patterns indicative of CSRF exploitation attempts. 6) If feasible, implement manual CSRF token validation or request method restrictions (e.g., disallow GET for state-changing operations) via custom patches or reverse proxies. 7) Isolate the AVideo administrative interface behind additional authentication layers or multi-factor authentication to reduce risk. These targeted mitigations go beyond generic advice and address the specific mechanics of this vulnerability.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Netherlands, India, Brazil, Japan
CVE-2026-33649: CWE-352: Cross-Site Request Forgery (CSRF) in WWBN AVideo
Description
CVE-2026-33649 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting WWBN AVideo versions up to 26. 0. The vulnerability exists because the setPermission. json. php endpoint accepts GET requests to change user group permissions without CSRF token validation. Additionally, the application sets session cookies with SameSite=None, allowing cross-site requests to carry session cookies. An unauthenticated attacker can exploit this by crafting a malicious page containing image tags that trigger permission changes when visited by an admin user. This leads to escalation of privileges, granting the attacker near-admin access. No patches are currently available, and no known exploits have been observed in the wild. Organizations using affected versions should urgently implement mitigations to prevent exploitation.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
WWBN AVideo, an open-source video platform, suffers from a critical CSRF vulnerability (CVE-2026-33649) in versions up to and including 26.0. The vulnerability resides in the plugin/Permissions/setPermission.json.php endpoint, which accepts GET parameters to perform state-changing operations that modify user group permissions. Crucially, this endpoint lacks any CSRF token validation, violating best practices for preventing unauthorized state changes via cross-site requests. Compounding the issue, the application explicitly sets session cookies with the attribute SameSite=None, which allows cookies to be sent with cross-origin requests, thereby enabling CSRF attacks. An attacker can exploit this by crafting a malicious webpage containing <img> tags that issue GET requests to the vulnerable endpoint. When an administrator visits this malicious page, the browser sends the admin's session cookie along with the GET request, silently modifying permissions to grant the attacker’s user group elevated privileges. This effectively escalates the attacker to near-admin access without authentication or user interaction beyond visiting the malicious page. The vulnerability has a CVSS 3.1 score of 8.1, reflecting its high impact on confidentiality and integrity. As of the publication date, no patches or fixes have been released, and no active exploits have been reported. The vulnerability highlights a critical design flaw in permission management and session cookie handling within AVideo.
Potential Impact
The impact of CVE-2026-33649 is significant for organizations using WWBN AVideo versions 26.0 and earlier. Successful exploitation allows an unauthenticated attacker to escalate privileges by silently modifying user group permissions through CSRF attacks. This can lead to near-administrative access, enabling the attacker to control video content, user management, and potentially deploy further malicious actions within the platform. The confidentiality and integrity of the platform’s data are severely compromised, as attackers can manipulate permissions and access sensitive information or disrupt service operations. Given the lack of authentication and the ease of exploitation via a simple visit to a malicious webpage, the threat surface is broad. Organizations relying on AVideo for video hosting, streaming, or content management face risks of unauthorized access, data leakage, and operational disruption. The absence of patches increases exposure time, making proactive mitigation critical. Additionally, the explicit use of SameSite=None on session cookies exacerbates the risk by facilitating cross-origin requests that carry authentication tokens.
Mitigation Recommendations
Until an official patch is released, organizations should implement several specific mitigations: 1) Restrict administrative access to trusted networks or VPNs to reduce exposure to external CSRF attacks. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests to the setPermission.json.php endpoint, especially those originating from external or untrusted domains. 3) Disable or limit the use of SameSite=None on session cookies if possible, or configure cookies with SameSite=Lax or Strict to prevent cross-site requests from carrying session tokens. 4) Educate administrators to avoid visiting untrusted websites while logged into the AVideo admin interface. 5) Monitor logs for unusual permission changes or access patterns indicative of CSRF exploitation attempts. 6) If feasible, implement manual CSRF token validation or request method restrictions (e.g., disallow GET for state-changing operations) via custom patches or reverse proxies. 7) Isolate the AVideo administrative interface behind additional authentication layers or multi-factor authentication to reduce risk. These targeted mitigations go beyond generic advice and address the specific mechanics of this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T15:23:42.217Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c18a60f4197a8e3b8159f3
Added to database: 3/23/2026, 6:45:52 PM
Last enriched: 3/23/2026, 7:01:16 PM
Last updated: 3/23/2026, 8:38:28 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.