Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33685: CWE-862: Missing Authorization in WWBN AVideo

0
Medium
VulnerabilityCVE-2026-33685cvecve-2026-33685cwe-862
Published: Mon Mar 23 2026 (03/23/2026, 18:42:45 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/AD_Server/reports.json.php` endpoint performs no authentication or authorization checks, allowing any unauthenticated attacker to extract ad campaign analytics data including video titles, user channel names, user IDs, ad campaign names, and impression/click counts. The HTML counterpart (`reports.php`) and CSV export (`getCSV.php`) both correctly enforce `User::isAdmin()`, but the JSON API was left unprotected. Commit daca4ffb1ce19643eecaa044362c41ac2ce45dde contains a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 19:18:48 UTC

Technical Analysis

WWBN AVideo is an open-source video platform widely used for hosting and streaming video content. In versions up to and including 26.0, the endpoint `plugin/AD_Server/reports.json.php` responsible for providing ad campaign analytics data does not perform any authentication or authorization checks. This is a classic case of missing authorization (CWE-862). As a result, any unauthenticated attacker can send requests to this JSON API and retrieve sensitive information such as video titles, user channel names, user IDs, ad campaign names, and metrics like impression and click counts. Notably, the HTML report page (`reports.php`) and CSV export (`getCSV.php`) correctly enforce admin-level access via `User::isAdmin()`, indicating a coding oversight limited to the JSON endpoint. The vulnerability is remotely exploitable without any user interaction or privileges, increasing its risk. Although the vulnerability does not allow modification or deletion of data, the exposure of sensitive analytics data can aid attackers in profiling users and campaigns, potentially facilitating targeted attacks or privacy violations. The vendor has addressed this issue in a patch committed under the identifier daca4ffb1ce19643eecaa044362c41ac2ce45dde. The CVSS v3.1 base score is 5.3 (medium), reflecting the confidentiality impact and ease of exploitation without authentication.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of sensitive ad campaign analytics data. Organizations using affected versions of WWBN AVideo risk exposure of internal marketing data, user identifiers, and video metadata. This can lead to privacy violations, competitive intelligence gathering by malicious actors, and potential reputational damage. While the vulnerability does not allow data modification or service disruption, the leaked information could be leveraged in social engineering, targeted phishing, or further attacks against the platform or its users. Media companies, content creators, and advertisers relying on AVideo for monetization and analytics are particularly at risk. The ease of exploitation and lack of required privileges mean attackers can quickly and remotely gather intelligence without detection. This could also violate data protection regulations if user-related data is exposed without consent.

Mitigation Recommendations

Organizations should immediately upgrade WWBN AVideo to a version that includes the patch fixing this vulnerability. If an upgrade is not immediately possible, administrators should implement network-level access controls to restrict access to the `plugin/AD_Server/reports.json.php` endpoint, such as IP whitelisting or VPN requirements. Additionally, web application firewalls (WAFs) can be configured to detect and block unauthorized requests to this endpoint. Reviewing and auditing all API endpoints for consistent authentication and authorization enforcement is recommended to prevent similar issues. Monitoring access logs for unusual or repeated requests to this JSON endpoint can help detect exploitation attempts. Finally, informing users and stakeholders about the exposure and reviewing privacy compliance measures is prudent.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T16:34:59.931Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c18de6f4197a8e3b82dd8d

Added to database: 3/23/2026, 7:00:54 PM

Last enriched: 3/23/2026, 7:18:48 PM

Last updated: 3/24/2026, 5:17:23 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses