Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33761: CWE-862: Missing Authorization in WWBN AVideo

0
Medium
VulnerabilityCVE-2026-33761cvecve-2026-33761cwe-862cwe-200
Published: Fri Mar 27 2026 (03/27/2026, 14:24:08 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, three `list.json.php` endpoints in the Scheduler plugin lack any authentication check, while every other endpoint in the same plugin directories (`add.json.php`, `delete.json.php`, `index.php`) requires `User::isAdmin()`. An unauthenticated attacker can retrieve all scheduled tasks (including internal callback URLs and parameters), admin-composed email messages, and user-to-email targeting mappings by sending simple GET requests. Commit 83390ab1fa8dca2de3f8fa76116a126428405431 contains a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 15:01:25 UTC

Technical Analysis

WWBN AVideo is an open-source video platform that includes a Scheduler plugin to manage scheduled tasks and email communications. In versions up to and including 26.0, three specific endpoints named list.json.php within this plugin do not enforce any authentication or authorization checks, unlike other endpoints in the same plugin directory which require administrative privileges validated via User::isAdmin(). This security oversight (CWE-862: Missing Authorization) allows unauthenticated attackers to send simple HTTP GET requests to these endpoints and retrieve sensitive information. The exposed data includes all scheduled tasks, which contain internal callback URLs and parameters, as well as email messages composed by administrators and mappings of users to email targets. This constitutes an information disclosure vulnerability (CWE-200) that could aid attackers in reconnaissance or social engineering attacks. The vulnerability has a CVSS 3.1 base score of 5.3, reflecting a medium severity level due to its ease of exploitation (no authentication or user interaction required) but limited impact to confidentiality only, with no integrity or availability impact. The vendor has addressed this issue in a patch committed under revision 83390ab1fa8dca2de3f8fa76116a126428405431. No public exploits have been reported to date.

Potential Impact

The primary impact of CVE-2026-33761 is unauthorized information disclosure. Attackers can gain insight into scheduled tasks, internal callback URLs, and email communications without any authentication, which could facilitate further attacks such as targeted phishing, social engineering, or exploitation of internal APIs. While the vulnerability does not allow modification or deletion of data, the exposure of internal operational details and user-email mappings can compromise privacy and operational security. Organizations relying on WWBN AVideo for video content management and scheduling may face reputational damage and increased risk of follow-on attacks. The scope is limited to affected versions (<= 26.0) and specifically the Scheduler plugin endpoints. Since no known exploits are in the wild, immediate risk is moderate but could escalate if attackers develop automated tools to harvest this information.

Mitigation Recommendations

Organizations should promptly update WWBN AVideo to a version that includes the patch for CVE-2026-33761. If immediate upgrading is not feasible, administrators should restrict network access to the Scheduler plugin endpoints, especially list.json.php, by implementing firewall rules or web application firewall (WAF) policies to block unauthenticated requests. Additionally, review and minimize the exposure of sensitive information in scheduled tasks and email templates. Conduct regular audits of plugin configurations and access controls to ensure no other endpoints lack proper authorization checks. Monitoring web server logs for unusual GET requests to these endpoints can help detect potential reconnaissance attempts. Finally, maintain an incident response plan to address any data exposure incidents swiftly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T18:30:14.126Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c697e13c064ed76fb722a0

Added to database: 3/27/2026, 2:44:49 PM

Last enriched: 3/27/2026, 3:01:25 PM

Last updated: 3/27/2026, 11:41:20 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses