Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33716: CWE-287: Improper Authentication in WWBN AVideo

0
Critical
VulnerabilityCVE-2026-33716cvecve-2026-33716cwe-287
Published: Mon Mar 23 2026 (03/23/2026, 18:46:47 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-33716 is a critical improper authentication vulnerability in WWBN AVideo versions up to 26. 0. The flaw exists in the standalone live stream control endpoint, which accepts a user-controlled streamerURL parameter that redirects token verification to an attacker-controlled server. This bypasses authentication entirely, allowing unauthenticated attackers to control live streams, including stopping/starting recordings and dropping active publishers. The vulnerability has a CVSS score of 9. 4, indicating high impact and ease of exploitation without any privileges or user interaction. A patch is available in commit 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128. Organizations using affected versions should urgently apply the patch to prevent unauthorized live stream manipulation and potential service disruption.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:42:14 UTC

Technical Analysis

WWBN AVideo is an open-source video platform that supports live streaming. In versions up to and including 26.0, the live stream control endpoint located at plugin/Live/standAloneFiles/control.json.php contains a critical improper authentication vulnerability (CWE-287). This endpoint accepts a user-supplied parameter named streamerURL, which is intended to specify the URL for token verification requests. However, due to insufficient validation, an attacker can supply a malicious streamerURL pointing to a server they control. This malicious server can respond with a fabricated token verification response indicating success ("{"error": false}"), effectively bypassing the authentication mechanism. As a result, the attacker gains unauthenticated control over live stream management functions, including forcibly dropping active stream publishers, starting or stopping recordings, and probing whether streams exist. This vulnerability allows attackers to disrupt live streaming services, manipulate content, and gather information about streaming activity without any authentication or user interaction. The vulnerability has been assigned CVE-2026-33716 and carries a CVSS 3.1 base score of 9.4 (critical), reflecting its high impact and ease of exploitation. A patch addressing this issue is available in commit 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128, which presumably corrects the validation of the streamerURL parameter or removes the ability to redirect token verification requests.

Potential Impact

The impact of CVE-2026-33716 is severe for organizations deploying WWBN AVideo versions 26.0 or earlier. Attackers can gain unauthorized control over live streaming operations without any credentials or user interaction, leading to significant confidentiality, integrity, and availability risks. Confidentiality is impacted as attackers can probe stream existence, potentially revealing sensitive streaming activity. Integrity is compromised because attackers can manipulate live streams by forcibly dropping publishers or altering recording states, undermining trust in the platform. Availability is affected as attackers can disrupt live broadcasts by stopping streams or recordings, causing service outages and reputational damage. For organizations relying on live streaming for communications, education, or entertainment, this can result in operational disruption, loss of audience trust, and potential financial losses. The vulnerability's ease of exploitation and lack of authentication requirements make it attractive for attackers, increasing the likelihood of exploitation if unpatched. Although no known exploits in the wild are reported yet, the critical severity and public disclosure necessitate immediate remediation to prevent potential attacks.

Mitigation Recommendations

To mitigate CVE-2026-33716, organizations should immediately upgrade WWBN AVideo to a version that includes the patch from commit 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128 or later. If upgrading is not immediately possible, implement the following specific mitigations: 1) Restrict access to the live stream control endpoint (plugin/Live/standAloneFiles/control.json.php) via network controls such as firewall rules or VPNs to trusted users only. 2) Monitor and log all requests to the live stream control endpoint to detect anomalous or unauthorized usage patterns, especially unusual streamerURL parameters. 3) Employ web application firewalls (WAFs) with custom rules to block requests containing suspicious or external streamerURL values. 4) Conduct thorough code reviews and testing to ensure that any user-supplied URLs used for token verification are strictly validated against a whitelist of trusted domains or disabled if unnecessary. 5) Educate administrators and developers about the risks of redirecting authentication requests to user-controlled endpoints and enforce secure coding practices. 6) Regularly audit and update all dependencies and plugins to minimize exposure to known vulnerabilities. These targeted actions, combined with patching, will reduce the risk of exploitation and limit the attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T17:06:05.748Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c18de6f4197a8e3b82dd99

Added to database: 3/23/2026, 7:00:54 PM

Last enriched: 3/30/2026, 8:42:14 PM

Last updated: 5/8/2026, 11:43:29 AM

Views: 115

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses