CVE-2026-33719: CWE-306: Missing Authentication for Critical Function in WWBN AVideo
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the CDN plugin endpoints `plugin/CDN/status.json.php` and `plugin/CDN/disable.json.php` use key-based authentication with an empty string default key. When the CDN plugin is enabled but the key has not been configured (the default state), the key validation check is completely bypassed, allowing any unauthenticated attacker to modify the full CDN configuration — including CDN URLs, storage credentials, and the authentication key itself — via mass-assignment through the `par` request parameter. Commit adeff0a31ba04a56f411eef256139fd7ed7d4310 contains a patch.
AI Analysis
Technical Summary
WWBN AVideo is an open-source video platform that includes a CDN plugin to manage content delivery network settings. In versions up to and including 26.0, the CDN plugin endpoints `plugin/CDN/status.json.php` and `plugin/CDN/disable.json.php` rely on a key-based authentication mechanism. However, the default key is an empty string, which means if administrators do not explicitly configure a key, the authentication check is bypassed entirely. This missing authentication for critical functions (CWE-306) allows any unauthenticated attacker to send crafted requests with the 'par' parameter to perform mass-assignment, modifying the entire CDN configuration. This includes changing CDN URLs, storage credentials, and even the authentication key itself, effectively granting full control over CDN settings. The vulnerability is remotely exploitable without any privileges or user interaction, making it highly dangerous. The CVSS 3.1 score of 8.6 reflects the high impact on integrity and moderate impact on confidentiality and availability. Although no known exploits are reported in the wild yet, a patch has been committed (commit adeff0a31ba04a56f411eef256139fd7ed7d4310) to address the issue by enforcing proper authentication checks.
Potential Impact
This vulnerability allows attackers to fully control the CDN configuration of affected WWBN AVideo instances, which can lead to several severe consequences. Attackers can redirect video content delivery to malicious or unauthorized servers, potentially distributing malicious content or intercepting user data, impacting confidentiality. They can alter storage credentials, risking data theft or deletion, affecting integrity and availability. Changing authentication keys can lock out legitimate administrators, causing denial of service. The ability to perform these actions without authentication and remotely increases the risk of widespread exploitation. Organizations relying on AVideo for video streaming, especially those using the CDN plugin, face risks of content tampering, data breaches, service disruption, and reputational damage. The vulnerability undermines trust in the platform’s security and could be leveraged in broader supply chain or content poisoning attacks.
Mitigation Recommendations
Organizations should immediately upgrade WWBN AVideo to a version that includes the patch fixing CVE-2026-33719. If upgrading is not immediately possible, administrators must ensure that the CDN plugin key is explicitly configured to a strong, non-empty value to prevent bypass of authentication. Review and restrict access to the CDN plugin endpoints via network controls such as firewalls or web application firewalls (WAFs) to limit exposure. Implement monitoring and alerting for unexpected changes to CDN configuration parameters. Conduct regular audits of plugin configurations and access logs to detect unauthorized modifications. Additionally, consider isolating the AVideo management interface from public networks or restricting it to trusted IP ranges. Finally, educate administrators on the importance of configuring security keys and promptly applying security patches.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2026-33719: CWE-306: Missing Authentication for Critical Function in WWBN AVideo
Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the CDN plugin endpoints `plugin/CDN/status.json.php` and `plugin/CDN/disable.json.php` use key-based authentication with an empty string default key. When the CDN plugin is enabled but the key has not been configured (the default state), the key validation check is completely bypassed, allowing any unauthenticated attacker to modify the full CDN configuration — including CDN URLs, storage credentials, and the authentication key itself — via mass-assignment through the `par` request parameter. Commit adeff0a31ba04a56f411eef256139fd7ed7d4310 contains a patch.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
WWBN AVideo is an open-source video platform that includes a CDN plugin to manage content delivery network settings. In versions up to and including 26.0, the CDN plugin endpoints `plugin/CDN/status.json.php` and `plugin/CDN/disable.json.php` rely on a key-based authentication mechanism. However, the default key is an empty string, which means if administrators do not explicitly configure a key, the authentication check is bypassed entirely. This missing authentication for critical functions (CWE-306) allows any unauthenticated attacker to send crafted requests with the 'par' parameter to perform mass-assignment, modifying the entire CDN configuration. This includes changing CDN URLs, storage credentials, and even the authentication key itself, effectively granting full control over CDN settings. The vulnerability is remotely exploitable without any privileges or user interaction, making it highly dangerous. The CVSS 3.1 score of 8.6 reflects the high impact on integrity and moderate impact on confidentiality and availability. Although no known exploits are reported in the wild yet, a patch has been committed (commit adeff0a31ba04a56f411eef256139fd7ed7d4310) to address the issue by enforcing proper authentication checks.
Potential Impact
This vulnerability allows attackers to fully control the CDN configuration of affected WWBN AVideo instances, which can lead to several severe consequences. Attackers can redirect video content delivery to malicious or unauthorized servers, potentially distributing malicious content or intercepting user data, impacting confidentiality. They can alter storage credentials, risking data theft or deletion, affecting integrity and availability. Changing authentication keys can lock out legitimate administrators, causing denial of service. The ability to perform these actions without authentication and remotely increases the risk of widespread exploitation. Organizations relying on AVideo for video streaming, especially those using the CDN plugin, face risks of content tampering, data breaches, service disruption, and reputational damage. The vulnerability undermines trust in the platform’s security and could be leveraged in broader supply chain or content poisoning attacks.
Mitigation Recommendations
Organizations should immediately upgrade WWBN AVideo to a version that includes the patch fixing CVE-2026-33719. If upgrading is not immediately possible, administrators must ensure that the CDN plugin key is explicitly configured to a strong, non-empty value to prevent bypass of authentication. Review and restrict access to the CDN plugin endpoints via network controls such as firewalls or web application firewalls (WAFs) to limit exposure. Implement monitoring and alerting for unexpected changes to CDN configuration parameters. Conduct regular audits of plugin configurations and access logs to detect unauthorized modifications. Additionally, consider isolating the AVideo management interface from public networks or restricting it to trusted IP ranges. Finally, educate administrators on the importance of configuring security keys and promptly applying security patches.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T17:06:05.749Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c18de8f4197a8e3b82ea87
Added to database: 3/23/2026, 7:00:56 PM
Last enriched: 3/30/2026, 8:19:11 PM
Last updated: 5/7/2026, 4:35:03 AM
Views: 84
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.