Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33716: CWE-287: Improper Authentication in WWBN AVideo

0
Critical
VulnerabilityCVE-2026-33716cvecve-2026-33716cwe-287
Published: Mon Mar 23 2026 (03/23/2026, 18:46:47 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-33716 is a critical improper authentication vulnerability in WWBN AVideo versions up to 26. 0. The flaw exists in the standalone live stream control endpoint, which accepts a user-controlled streamerURL parameter that redirects token verification requests. An attacker can exploit this by redirecting verification to a malicious server that always returns success, bypassing authentication entirely. This allows unauthenticated attackers to control live streams, including stopping/starting recordings, dropping active publishers, and probing stream existence. The vulnerability has a CVSS score of 9. 4, indicating high severity with no authentication or user interaction required. A patch is available in commit 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128. Organizations using affected versions should apply the patch immediately to prevent unauthorized live stream control.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 19:16:46 UTC

Technical Analysis

WWBN AVideo is an open-source video platform widely used for live streaming and video hosting. In versions up to and including 26.0, the standalone live stream control endpoint at plugin/Live/standAloneFiles/control.json.php contains a critical improper authentication vulnerability (CWE-287). The endpoint accepts a user-supplied parameter named streamerURL, which determines the destination for token verification requests. Due to insufficient validation, an attacker can supply a malicious streamerURL pointing to a server they control. This malicious server can respond with a fabricated JSON response indicating no error ("{"error": false}"), effectively bypassing the platform's authentication mechanism. Exploiting this flaw grants attackers unauthenticated control over live stream management functions, including forcibly dropping active stream publishers, starting or stopping recordings, and probing whether streams exist. The vulnerability is remotely exploitable over the network without any privileges or user interaction, making it highly dangerous. The issue was addressed in a patch committed under hash 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128. The CVSS v3.1 base score is 9.4 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H), reflecting the ease of exploitation and significant impact on integrity and availability, though confidentiality impact is low. No known exploits in the wild have been reported yet.

Potential Impact

This vulnerability allows attackers to bypass authentication controls on live stream management, which can severely disrupt video streaming services. Attackers can terminate ongoing streams, preventing legitimate broadcasters from reaching their audience, or manipulate recordings, potentially causing data loss or unauthorized content manipulation. The ability to probe stream existence can also aid in reconnaissance for further attacks. For organizations relying on AVideo for live events, education, or corporate communications, this can result in significant operational disruption, reputational damage, and potential financial loss. The lack of authentication requirement and ease of exploitation increase the risk of widespread abuse, especially in environments where live streaming is critical. Additionally, attackers could use this access to interfere with content integrity and availability, undermining trust in the platform.

Mitigation Recommendations

Organizations using WWBN AVideo versions 26.0 or earlier must immediately apply the patch available in commit 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128 to fix the improper authentication flaw. Until patched, administrators should restrict access to the vulnerable endpoint by implementing network-level controls such as IP whitelisting or firewall rules to limit access to trusted users only. Monitoring and logging of live stream control endpoint requests should be enhanced to detect suspicious or anomalous activity, such as unexpected streamerURL parameters or unusual control commands. Additionally, consider deploying Web Application Firewalls (WAFs) with custom rules to block requests attempting to redirect token verification externally. Regularly audit and review live stream management logs to identify potential unauthorized actions. Finally, educate users and administrators about the risk and ensure that all components of the AVideo platform are kept up to date with security patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T17:06:05.748Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c18de6f4197a8e3b82dd99

Added to database: 3/23/2026, 7:00:54 PM

Last enriched: 3/23/2026, 7:16:46 PM

Last updated: 3/23/2026, 9:09:05 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses