Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33719: CWE-306: Missing Authentication for Critical Function in WWBN AVideo

0
High
VulnerabilityCVE-2026-33719cvecve-2026-33719cwe-306
Published: Mon Mar 23 2026 (03/23/2026, 18:49:28 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-33719 is a high-severity vulnerability in WWBN AVideo versions up to 26. 0 affecting the CDN plugin. The plugin endpoints use key-based authentication with a default empty string key, which if not configured, allows unauthenticated attackers to bypass authentication entirely. This enables attackers to modify critical CDN configurations, including URLs, storage credentials, and authentication keys, via mass-assignment through the 'par' request parameter. The vulnerability stems from missing authentication controls on critical functions (CWE-306). Exploitation requires no user interaction or privileges and can lead to significant integrity and limited confidentiality impacts. A patch has been committed to address this issue. Organizations using affected versions should apply the patch promptly and verify CDN plugin configurations to prevent unauthorized access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 19:16:19 UTC

Technical Analysis

CVE-2026-33719 is a vulnerability identified in the WWBN AVideo open-source video platform, specifically affecting versions up to and including 26.0. The issue resides in the CDN plugin, which exposes two endpoints: `plugin/CDN/status.json.php` and `plugin/CDN/disable.json.php`. These endpoints rely on key-based authentication; however, the default key is an empty string. If administrators do not explicitly configure a non-empty key, the authentication check is effectively bypassed, allowing any unauthenticated attacker to access these endpoints. Through mass-assignment via the `par` request parameter, attackers can manipulate the entire CDN configuration, including critical parameters such as CDN URLs, storage credentials, and even the authentication key itself. This vulnerability is classified under CWE-306, indicating missing authentication for critical functions. The flaw allows attackers to alter the integrity of the CDN configuration, potentially redirecting video content delivery, exfiltrating credentials, or locking out legitimate administrators by changing keys. The CVSS v3.1 base score is 8.6, reflecting a high severity due to network attack vector, no required privileges or user interaction, and significant impact on integrity with some impact on confidentiality and availability. Although no known exploits are reported in the wild, the vulnerability presents a serious risk to affected deployments. A patch has been committed (commit adeff0a31ba04a56f411eef256139fd7ed7d4310) to enforce proper authentication and prevent bypass. Organizations should update to patched versions and audit their CDN plugin configurations to ensure keys are properly set and endpoints are secured.

Potential Impact

The vulnerability allows unauthenticated attackers to fully control the CDN plugin configuration in WWBN AVideo installations running vulnerable versions. This can lead to several impactful scenarios: attackers can redirect video content delivery to malicious or unauthorized servers, potentially distributing malicious content or intercepting user data. They can exfiltrate or alter storage credentials, risking data theft or loss. Changing authentication keys can lock out legitimate administrators, causing denial of service or persistent unauthorized access. The integrity of the video delivery infrastructure is severely compromised, and confidentiality is partially impacted due to exposure of sensitive configuration data. Availability impact is low but possible if attackers disable CDN functionality. Organizations relying on AVideo for content delivery face risks of brand damage, user trust erosion, and potential regulatory consequences if user data is exposed or manipulated. The ease of exploitation and lack of authentication requirements increase the likelihood of attacks, especially in environments where default configurations are left unchanged.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update WWBN AVideo to a version that includes the patch commit adeff0a31ba04a56f411eef256139fd7ed7d4310 or later. If immediate patching is not possible, administrators must ensure that the CDN plugin key is explicitly configured to a strong, non-empty value to prevent authentication bypass. Access to the CDN plugin endpoints should be restricted using network controls such as firewall rules or VPNs to limit exposure to trusted administrators only. Regular audits of CDN plugin configurations should be conducted to detect unauthorized changes. Implement monitoring and alerting on configuration changes to quickly identify suspicious activity. Additionally, consider isolating the AVideo platform within a segmented network zone to reduce the blast radius of potential exploitation. Finally, educate administrators about the risks of default configurations and enforce secure deployment practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T17:06:05.749Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c18de8f4197a8e3b82ea87

Added to database: 3/23/2026, 7:00:56 PM

Last enriched: 3/23/2026, 7:16:19 PM

Last updated: 3/23/2026, 9:09:09 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses