CVE-2026-33716: CWE-287: Improper Authentication in WWBN AVideo
CVE-2026-33716 is a critical improper authentication vulnerability in WWBN AVideo versions up to 26. 0. The flaw exists in the standalone live stream control endpoint, which accepts a user-controlled streamerURL parameter that redirects token verification to an attacker-controlled server. This bypasses authentication entirely, allowing unauthenticated attackers to control live streams, including stopping/starting recordings and dropping active publishers. The vulnerability has a CVSS score of 9. 4, indicating high impact and ease of exploitation without any privileges or user interaction. A patch is available in commit 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128. Organizations using affected versions should urgently apply the patch to prevent unauthorized live stream manipulation and potential service disruption.
AI Analysis
Technical Summary
WWBN AVideo is an open-source video platform that supports live streaming. In versions up to and including 26.0, the live stream control endpoint located at plugin/Live/standAloneFiles/control.json.php contains a critical improper authentication vulnerability (CWE-287). This endpoint accepts a user-supplied parameter named streamerURL, which is intended to specify the URL for token verification requests. However, due to insufficient validation, an attacker can supply a malicious streamerURL pointing to a server they control. This malicious server can respond with a fabricated token verification response indicating success ("{"error": false}"), effectively bypassing the authentication mechanism. As a result, the attacker gains unauthenticated control over live stream management functions, including forcibly dropping active stream publishers, starting or stopping recordings, and probing whether streams exist. This vulnerability allows attackers to disrupt live streaming services, manipulate content, and gather information about streaming activity without any authentication or user interaction. The vulnerability has been assigned CVE-2026-33716 and carries a CVSS 3.1 base score of 9.4 (critical), reflecting its high impact and ease of exploitation. A patch addressing this issue is available in commit 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128, which presumably corrects the validation of the streamerURL parameter or removes the ability to redirect token verification requests.
Potential Impact
The impact of CVE-2026-33716 is severe for organizations deploying WWBN AVideo versions 26.0 or earlier. Attackers can gain unauthorized control over live streaming operations without any credentials or user interaction, leading to significant confidentiality, integrity, and availability risks. Confidentiality is impacted as attackers can probe stream existence, potentially revealing sensitive streaming activity. Integrity is compromised because attackers can manipulate live streams by forcibly dropping publishers or altering recording states, undermining trust in the platform. Availability is affected as attackers can disrupt live broadcasts by stopping streams or recordings, causing service outages and reputational damage. For organizations relying on live streaming for communications, education, or entertainment, this can result in operational disruption, loss of audience trust, and potential financial losses. The vulnerability's ease of exploitation and lack of authentication requirements make it attractive for attackers, increasing the likelihood of exploitation if unpatched. Although no known exploits in the wild are reported yet, the critical severity and public disclosure necessitate immediate remediation to prevent potential attacks.
Mitigation Recommendations
To mitigate CVE-2026-33716, organizations should immediately upgrade WWBN AVideo to a version that includes the patch from commit 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128 or later. If upgrading is not immediately possible, implement the following specific mitigations: 1) Restrict access to the live stream control endpoint (plugin/Live/standAloneFiles/control.json.php) via network controls such as firewall rules or VPNs to trusted users only. 2) Monitor and log all requests to the live stream control endpoint to detect anomalous or unauthorized usage patterns, especially unusual streamerURL parameters. 3) Employ web application firewalls (WAFs) with custom rules to block requests containing suspicious or external streamerURL values. 4) Conduct thorough code reviews and testing to ensure that any user-supplied URLs used for token verification are strictly validated against a whitelist of trusted domains or disabled if unnecessary. 5) Educate administrators and developers about the risks of redirecting authentication requests to user-controlled endpoints and enforce secure coding practices. 6) Regularly audit and update all dependencies and plugins to minimize exposure to known vulnerabilities. These targeted actions, combined with patching, will reduce the risk of exploitation and limit the attack surface.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, India, Brazil
CVE-2026-33716: CWE-287: Improper Authentication in WWBN AVideo
Description
CVE-2026-33716 is a critical improper authentication vulnerability in WWBN AVideo versions up to 26. 0. The flaw exists in the standalone live stream control endpoint, which accepts a user-controlled streamerURL parameter that redirects token verification to an attacker-controlled server. This bypasses authentication entirely, allowing unauthenticated attackers to control live streams, including stopping/starting recordings and dropping active publishers. The vulnerability has a CVSS score of 9. 4, indicating high impact and ease of exploitation without any privileges or user interaction. A patch is available in commit 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128. Organizations using affected versions should urgently apply the patch to prevent unauthorized live stream manipulation and potential service disruption.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
WWBN AVideo is an open-source video platform that supports live streaming. In versions up to and including 26.0, the live stream control endpoint located at plugin/Live/standAloneFiles/control.json.php contains a critical improper authentication vulnerability (CWE-287). This endpoint accepts a user-supplied parameter named streamerURL, which is intended to specify the URL for token verification requests. However, due to insufficient validation, an attacker can supply a malicious streamerURL pointing to a server they control. This malicious server can respond with a fabricated token verification response indicating success ("{"error": false}"), effectively bypassing the authentication mechanism. As a result, the attacker gains unauthenticated control over live stream management functions, including forcibly dropping active stream publishers, starting or stopping recordings, and probing whether streams exist. This vulnerability allows attackers to disrupt live streaming services, manipulate content, and gather information about streaming activity without any authentication or user interaction. The vulnerability has been assigned CVE-2026-33716 and carries a CVSS 3.1 base score of 9.4 (critical), reflecting its high impact and ease of exploitation. A patch addressing this issue is available in commit 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128, which presumably corrects the validation of the streamerURL parameter or removes the ability to redirect token verification requests.
Potential Impact
The impact of CVE-2026-33716 is severe for organizations deploying WWBN AVideo versions 26.0 or earlier. Attackers can gain unauthorized control over live streaming operations without any credentials or user interaction, leading to significant confidentiality, integrity, and availability risks. Confidentiality is impacted as attackers can probe stream existence, potentially revealing sensitive streaming activity. Integrity is compromised because attackers can manipulate live streams by forcibly dropping publishers or altering recording states, undermining trust in the platform. Availability is affected as attackers can disrupt live broadcasts by stopping streams or recordings, causing service outages and reputational damage. For organizations relying on live streaming for communications, education, or entertainment, this can result in operational disruption, loss of audience trust, and potential financial losses. The vulnerability's ease of exploitation and lack of authentication requirements make it attractive for attackers, increasing the likelihood of exploitation if unpatched. Although no known exploits in the wild are reported yet, the critical severity and public disclosure necessitate immediate remediation to prevent potential attacks.
Mitigation Recommendations
To mitigate CVE-2026-33716, organizations should immediately upgrade WWBN AVideo to a version that includes the patch from commit 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128 or later. If upgrading is not immediately possible, implement the following specific mitigations: 1) Restrict access to the live stream control endpoint (plugin/Live/standAloneFiles/control.json.php) via network controls such as firewall rules or VPNs to trusted users only. 2) Monitor and log all requests to the live stream control endpoint to detect anomalous or unauthorized usage patterns, especially unusual streamerURL parameters. 3) Employ web application firewalls (WAFs) with custom rules to block requests containing suspicious or external streamerURL values. 4) Conduct thorough code reviews and testing to ensure that any user-supplied URLs used for token verification are strictly validated against a whitelist of trusted domains or disabled if unnecessary. 5) Educate administrators and developers about the risks of redirecting authentication requests to user-controlled endpoints and enforce secure coding practices. 6) Regularly audit and update all dependencies and plugins to minimize exposure to known vulnerabilities. These targeted actions, combined with patching, will reduce the risk of exploitation and limit the attack surface.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T17:06:05.748Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c18de6f4197a8e3b82dd99
Added to database: 3/23/2026, 7:00:54 PM
Last enriched: 3/30/2026, 8:42:14 PM
Last updated: 5/8/2026, 11:43:29 AM
Views: 115
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.