Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33719: CWE-306: Missing Authentication for Critical Function in WWBN AVideo

0
High
VulnerabilityCVE-2026-33719cvecve-2026-33719cwe-306
Published: Mon Mar 23 2026 (03/23/2026, 18:49:28 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the CDN plugin endpoints `plugin/CDN/status.json.php` and `plugin/CDN/disable.json.php` use key-based authentication with an empty string default key. When the CDN plugin is enabled but the key has not been configured (the default state), the key validation check is completely bypassed, allowing any unauthenticated attacker to modify the full CDN configuration — including CDN URLs, storage credentials, and the authentication key itself — via mass-assignment through the `par` request parameter. Commit adeff0a31ba04a56f411eef256139fd7ed7d4310 contains a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:19:11 UTC

Technical Analysis

WWBN AVideo is an open-source video platform that includes a CDN plugin to manage content delivery network settings. In versions up to and including 26.0, the CDN plugin endpoints `plugin/CDN/status.json.php` and `plugin/CDN/disable.json.php` rely on a key-based authentication mechanism. However, the default key is an empty string, which means if administrators do not explicitly configure a key, the authentication check is bypassed entirely. This missing authentication for critical functions (CWE-306) allows any unauthenticated attacker to send crafted requests with the 'par' parameter to perform mass-assignment, modifying the entire CDN configuration. This includes changing CDN URLs, storage credentials, and even the authentication key itself, effectively granting full control over CDN settings. The vulnerability is remotely exploitable without any privileges or user interaction, making it highly dangerous. The CVSS 3.1 score of 8.6 reflects the high impact on integrity and moderate impact on confidentiality and availability. Although no known exploits are reported in the wild yet, a patch has been committed (commit adeff0a31ba04a56f411eef256139fd7ed7d4310) to address the issue by enforcing proper authentication checks.

Potential Impact

This vulnerability allows attackers to fully control the CDN configuration of affected WWBN AVideo instances, which can lead to several severe consequences. Attackers can redirect video content delivery to malicious or unauthorized servers, potentially distributing malicious content or intercepting user data, impacting confidentiality. They can alter storage credentials, risking data theft or deletion, affecting integrity and availability. Changing authentication keys can lock out legitimate administrators, causing denial of service. The ability to perform these actions without authentication and remotely increases the risk of widespread exploitation. Organizations relying on AVideo for video streaming, especially those using the CDN plugin, face risks of content tampering, data breaches, service disruption, and reputational damage. The vulnerability undermines trust in the platform’s security and could be leveraged in broader supply chain or content poisoning attacks.

Mitigation Recommendations

Organizations should immediately upgrade WWBN AVideo to a version that includes the patch fixing CVE-2026-33719. If upgrading is not immediately possible, administrators must ensure that the CDN plugin key is explicitly configured to a strong, non-empty value to prevent bypass of authentication. Review and restrict access to the CDN plugin endpoints via network controls such as firewalls or web application firewalls (WAFs) to limit exposure. Implement monitoring and alerting for unexpected changes to CDN configuration parameters. Conduct regular audits of plugin configurations and access logs to detect unauthorized modifications. Additionally, consider isolating the AVideo management interface from public networks or restricting it to trusted IP ranges. Finally, educate administrators on the importance of configuring security keys and promptly applying security patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T17:06:05.749Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c18de8f4197a8e3b82ea87

Added to database: 3/23/2026, 7:00:56 PM

Last enriched: 3/30/2026, 8:19:11 PM

Last updated: 5/7/2026, 4:35:03 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses