CVE-2026-33688: CWE-204: Observable Response Discrepancy in WWBN AVideo
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the password recovery endpoint at `objects/userRecoverPass.php` performs user existence and account status checks before validating the captcha. This allows an unauthenticated attacker to enumerate valid usernames and determine whether accounts are active, inactive, or banned — at scale and without solving any captcha — by observing three distinct JSON error responses. Commit e42f54123b460fd1b2ee01f2ce3d4a386e88d157 contains a patch.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-33688 affects WWBN AVideo, an open-source video platform, in versions up to and including 26.0. The issue lies in the password recovery endpoint located at `objects/userRecoverPass.php`. This endpoint performs user existence and account status verification before validating the captcha challenge. As a result, an unauthenticated attacker can send requests to this endpoint and receive one of three distinct JSON error responses indicating whether a username exists and if the account is active, inactive, or banned. This behavior constitutes an observable response discrepancy (CWE-204) that enables user enumeration attacks without requiring any user interaction or captcha solving. The vulnerability does not allow direct password resets or account takeover but leaks sensitive information about user accounts. The patch, referenced by commit e42f54123b460fd1b2ee01f2ce3d4a386e88d157, modifies the logic to ensure captcha validation occurs before any user or account status checks, preventing attackers from distinguishing account states via response differences. The CVSS v3.1 base score is 5.3, reflecting a medium severity with network attack vector, low attack complexity, no privileges or user interaction required, and limited confidentiality impact. No known exploits are currently reported in the wild.
Potential Impact
The primary impact of this vulnerability is information disclosure through user enumeration and account status enumeration. Attackers can compile lists of valid usernames and identify which accounts are active, inactive, or banned. This information can be leveraged to conduct targeted phishing campaigns, credential stuffing attacks using leaked or common passwords, or social engineering attacks aimed at specific users. While the vulnerability does not allow direct account compromise or denial of service, the leaked information reduces the security posture of affected organizations by facilitating further attacks. Organizations with large user bases or high-value accounts on WWBN AVideo platforms are at greater risk. Additionally, attackers could automate enumeration at scale due to the lack of captcha enforcement before user checks, increasing the threat magnitude. The exposure of banned or inactive account statuses may also reveal internal account management policies or user behavior patterns.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately apply the patch referenced by commit e42f54123b460fd1b2ee01f2ce3d4a386e88d157 or upgrade to a fixed version beyond 26.0. Beyond patching, it is recommended to redesign the password recovery workflow to validate captcha challenges before any user existence or account status checks to prevent response discrepancies. Implement rate limiting and IP-based throttling on password recovery endpoints to reduce automated enumeration attempts. Logging and monitoring of suspicious password recovery requests can help detect enumeration activity. Consider implementing generic error messages that do not reveal account existence or status information. Additionally, multi-factor authentication (MFA) should be enforced on accounts to mitigate risks from credential stuffing attacks that may follow enumeration. Regular security assessments of authentication and recovery endpoints are advised to identify similar logic flaws.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Japan, South Korea, Brazil
CVE-2026-33688: CWE-204: Observable Response Discrepancy in WWBN AVideo
Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the password recovery endpoint at `objects/userRecoverPass.php` performs user existence and account status checks before validating the captcha. This allows an unauthenticated attacker to enumerate valid usernames and determine whether accounts are active, inactive, or banned — at scale and without solving any captcha — by observing three distinct JSON error responses. Commit e42f54123b460fd1b2ee01f2ce3d4a386e88d157 contains a patch.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-33688 affects WWBN AVideo, an open-source video platform, in versions up to and including 26.0. The issue lies in the password recovery endpoint located at `objects/userRecoverPass.php`. This endpoint performs user existence and account status verification before validating the captcha challenge. As a result, an unauthenticated attacker can send requests to this endpoint and receive one of three distinct JSON error responses indicating whether a username exists and if the account is active, inactive, or banned. This behavior constitutes an observable response discrepancy (CWE-204) that enables user enumeration attacks without requiring any user interaction or captcha solving. The vulnerability does not allow direct password resets or account takeover but leaks sensitive information about user accounts. The patch, referenced by commit e42f54123b460fd1b2ee01f2ce3d4a386e88d157, modifies the logic to ensure captcha validation occurs before any user or account status checks, preventing attackers from distinguishing account states via response differences. The CVSS v3.1 base score is 5.3, reflecting a medium severity with network attack vector, low attack complexity, no privileges or user interaction required, and limited confidentiality impact. No known exploits are currently reported in the wild.
Potential Impact
The primary impact of this vulnerability is information disclosure through user enumeration and account status enumeration. Attackers can compile lists of valid usernames and identify which accounts are active, inactive, or banned. This information can be leveraged to conduct targeted phishing campaigns, credential stuffing attacks using leaked or common passwords, or social engineering attacks aimed at specific users. While the vulnerability does not allow direct account compromise or denial of service, the leaked information reduces the security posture of affected organizations by facilitating further attacks. Organizations with large user bases or high-value accounts on WWBN AVideo platforms are at greater risk. Additionally, attackers could automate enumeration at scale due to the lack of captcha enforcement before user checks, increasing the threat magnitude. The exposure of banned or inactive account statuses may also reveal internal account management policies or user behavior patterns.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately apply the patch referenced by commit e42f54123b460fd1b2ee01f2ce3d4a386e88d157 or upgrade to a fixed version beyond 26.0. Beyond patching, it is recommended to redesign the password recovery workflow to validate captcha challenges before any user existence or account status checks to prevent response discrepancies. Implement rate limiting and IP-based throttling on password recovery endpoints to reduce automated enumeration attempts. Logging and monitoring of suspicious password recovery requests can help detect enumeration activity. Consider implementing generic error messages that do not reveal account existence or status information. Additionally, multi-factor authentication (MFA) should be enforced on accounts to mitigate risks from credential stuffing attacks that may follow enumeration. Regular security assessments of authentication and recovery endpoints are advised to identify similar logic flaws.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T16:34:59.932Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c18de6f4197a8e3b82dd91
Added to database: 3/23/2026, 7:00:54 PM
Last enriched: 3/23/2026, 7:18:36 PM
Last updated: 3/24/2026, 6:51:09 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.