Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33690: CWE-348: Use of Less Trusted Source in WWBN AVideo

0
Medium
VulnerabilityCVE-2026-33690cvecve-2026-33690cwe-348
Published: Mon Mar 23 2026 (03/23/2026, 18:45:25 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `getRealIpAddr()` function in `objects/functions.php` trusts user-controlled HTTP headers to determine the client's IP address. An attacker can spoof their IP address by sending forged headers, bypassing any IP-based access controls or audit logging. Commit 1a1df6a9377e5cc67d1d0ac8ef571f7abbffbc6c contains a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 19:18:18 UTC

Technical Analysis

CVE-2026-33690 is a vulnerability classified under CWE-348 (Use of Less Trusted Source) affecting the open-source video platform WWBN AVideo in versions up to and including 26.0. The root cause lies in the getRealIpAddr() function located in objects/functions.php, which determines the client's IP address by trusting HTTP headers such as X-Forwarded-For or similar. Since these headers can be manipulated by an attacker, the function may return a spoofed IP address rather than the true client IP. This flaw allows attackers to bypass IP-based access controls, which rely on accurate client IP identification to restrict or allow access. Additionally, audit logs that record client IPs for security monitoring can be corrupted, undermining forensic investigations and incident response. The vulnerability has a CVSS 3.1 base score of 5.3 (medium severity) with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, no confidentiality or availability impact, but partial integrity impact. A patch addressing this issue is available in commit 1a1df6a9377e5cc67d1d0ac8ef571f7abbffbc6c, which presumably modifies the IP detection logic to rely on more trusted sources or validate headers properly. No known exploits are currently reported in the wild.

Potential Impact

The primary impact of this vulnerability is the ability for attackers to spoof their IP address when interacting with the AVideo platform. This can lead to bypassing IP-based access controls, allowing unauthorized access to restricted content or administrative functions if those controls are IP-dependent. It also compromises the integrity of audit logs, as the recorded IP addresses may not reflect the true source of actions, hindering incident detection and forensic analysis. Although confidentiality and availability are not directly affected, the undermining of security controls can facilitate further attacks or unauthorized activities. Organizations relying heavily on IP-based restrictions or logging for security monitoring are particularly at risk. The ease of exploitation (no authentication or user interaction needed) increases the threat level, especially in environments exposed to untrusted networks. However, the scope is limited to AVideo installations running vulnerable versions, and the impact is mitigated if IP-based controls are not a primary security mechanism.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update WWBN AVideo to a version that includes the patch from commit 1a1df6a9377e5cc67d1d0ac8ef571f7abbffbc6c or later. If immediate patching is not possible, administrators should consider disabling reliance on HTTP headers for IP determination or implement server-side validation to ensure headers like X-Forwarded-For are only trusted from known, secure proxies. Network-level controls such as firewall rules or reverse proxies can be configured to strip or validate spoofed headers. Additionally, IP-based access controls should be supplemented with stronger authentication mechanisms to reduce reliance on IP addresses alone. Audit logging should be enhanced to include multiple indicators of client identity beyond IP addresses. Regular monitoring for anomalous IP usage patterns and correlation with other logs can help detect exploitation attempts. Finally, educating administrators about the risks of trusting user-controlled headers is essential for preventing similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T16:34:59.932Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c18de6f4197a8e3b82dd95

Added to database: 3/23/2026, 7:00:54 PM

Last enriched: 3/23/2026, 7:18:18 PM

Last updated: 3/24/2026, 5:17:29 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses