CVE-2026-33761: CWE-862: Missing Authorization in WWBN AVideo
WWBN AVideo is an open source video platform. In versions up to and including 26.0, three `list.json.php` endpoints in the Scheduler plugin lack any authentication check, while every other endpoint in the same plugin directories (`add.json.php`, `delete.json.php`, `index.php`) requires `User::isAdmin()`. An unauthenticated attacker can retrieve all scheduled tasks (including internal callback URLs and parameters), admin-composed email messages, and user-to-email targeting mappings by sending simple GET requests. Commit 83390ab1fa8dca2de3f8fa76116a126428405431 contains a patch.
AI Analysis
Technical Summary
WWBN AVideo is an open-source video platform that includes a Scheduler plugin to manage scheduled tasks and email communications. In versions up to and including 26.0, three specific endpoints named list.json.php within this plugin do not enforce any authentication or authorization checks, unlike other endpoints in the same plugin directory which require administrative privileges validated via User::isAdmin(). This security oversight (CWE-862: Missing Authorization) allows unauthenticated attackers to send simple HTTP GET requests to these endpoints and retrieve sensitive information. The exposed data includes all scheduled tasks, which contain internal callback URLs and parameters, as well as email messages composed by administrators and mappings of users to email targets. This constitutes an information disclosure vulnerability (CWE-200) that could aid attackers in reconnaissance or social engineering attacks. The vulnerability has a CVSS 3.1 base score of 5.3, reflecting a medium severity level due to its ease of exploitation (no authentication or user interaction required) but limited impact to confidentiality only, with no integrity or availability impact. The vendor has addressed this issue in a patch committed under revision 83390ab1fa8dca2de3f8fa76116a126428405431. No public exploits have been reported to date.
Potential Impact
The primary impact of CVE-2026-33761 is unauthorized information disclosure. Attackers can gain insight into scheduled tasks, internal callback URLs, and email communications without any authentication, which could facilitate further attacks such as targeted phishing, social engineering, or exploitation of internal APIs. While the vulnerability does not allow modification or deletion of data, the exposure of internal operational details and user-email mappings can compromise privacy and operational security. Organizations relying on WWBN AVideo for video content management and scheduling may face reputational damage and increased risk of follow-on attacks. The scope is limited to affected versions (<= 26.0) and specifically the Scheduler plugin endpoints. Since no known exploits are in the wild, immediate risk is moderate but could escalate if attackers develop automated tools to harvest this information.
Mitigation Recommendations
Organizations should promptly update WWBN AVideo to a version that includes the patch for CVE-2026-33761. If immediate upgrading is not feasible, administrators should restrict network access to the Scheduler plugin endpoints, especially list.json.php, by implementing firewall rules or web application firewall (WAF) policies to block unauthenticated requests. Additionally, review and minimize the exposure of sensitive information in scheduled tasks and email templates. Conduct regular audits of plugin configurations and access controls to ensure no other endpoints lack proper authorization checks. Monitoring web server logs for unusual GET requests to these endpoints can help detect potential reconnaissance attempts. Finally, maintain an incident response plan to address any data exposure incidents swiftly.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Japan, India, Brazil, Netherlands
CVE-2026-33761: CWE-862: Missing Authorization in WWBN AVideo
Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, three `list.json.php` endpoints in the Scheduler plugin lack any authentication check, while every other endpoint in the same plugin directories (`add.json.php`, `delete.json.php`, `index.php`) requires `User::isAdmin()`. An unauthenticated attacker can retrieve all scheduled tasks (including internal callback URLs and parameters), admin-composed email messages, and user-to-email targeting mappings by sending simple GET requests. Commit 83390ab1fa8dca2de3f8fa76116a126428405431 contains a patch.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
WWBN AVideo is an open-source video platform that includes a Scheduler plugin to manage scheduled tasks and email communications. In versions up to and including 26.0, three specific endpoints named list.json.php within this plugin do not enforce any authentication or authorization checks, unlike other endpoints in the same plugin directory which require administrative privileges validated via User::isAdmin(). This security oversight (CWE-862: Missing Authorization) allows unauthenticated attackers to send simple HTTP GET requests to these endpoints and retrieve sensitive information. The exposed data includes all scheduled tasks, which contain internal callback URLs and parameters, as well as email messages composed by administrators and mappings of users to email targets. This constitutes an information disclosure vulnerability (CWE-200) that could aid attackers in reconnaissance or social engineering attacks. The vulnerability has a CVSS 3.1 base score of 5.3, reflecting a medium severity level due to its ease of exploitation (no authentication or user interaction required) but limited impact to confidentiality only, with no integrity or availability impact. The vendor has addressed this issue in a patch committed under revision 83390ab1fa8dca2de3f8fa76116a126428405431. No public exploits have been reported to date.
Potential Impact
The primary impact of CVE-2026-33761 is unauthorized information disclosure. Attackers can gain insight into scheduled tasks, internal callback URLs, and email communications without any authentication, which could facilitate further attacks such as targeted phishing, social engineering, or exploitation of internal APIs. While the vulnerability does not allow modification or deletion of data, the exposure of internal operational details and user-email mappings can compromise privacy and operational security. Organizations relying on WWBN AVideo for video content management and scheduling may face reputational damage and increased risk of follow-on attacks. The scope is limited to affected versions (<= 26.0) and specifically the Scheduler plugin endpoints. Since no known exploits are in the wild, immediate risk is moderate but could escalate if attackers develop automated tools to harvest this information.
Mitigation Recommendations
Organizations should promptly update WWBN AVideo to a version that includes the patch for CVE-2026-33761. If immediate upgrading is not feasible, administrators should restrict network access to the Scheduler plugin endpoints, especially list.json.php, by implementing firewall rules or web application firewall (WAF) policies to block unauthenticated requests. Additionally, review and minimize the exposure of sensitive information in scheduled tasks and email templates. Conduct regular audits of plugin configurations and access controls to ensure no other endpoints lack proper authorization checks. Monitoring web server logs for unusual GET requests to these endpoints can help detect potential reconnaissance attempts. Finally, maintain an incident response plan to address any data exposure incidents swiftly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T18:30:14.126Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c697e13c064ed76fb722a0
Added to database: 3/27/2026, 2:44:49 PM
Last enriched: 3/27/2026, 3:01:25 PM
Last updated: 3/27/2026, 11:41:20 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.