Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33763: CWE-307: Improper Restriction of Excessive Authentication Attempts in WWBN AVideo

0
Medium
VulnerabilityCVE-2026-33763cvecve-2026-33763cwe-307
Published: Fri Mar 27 2026 (03/27/2026, 14:25:12 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-33763 is a medium severity vulnerability in WWBN AVideo versions up to 26. 0 that allows unauthenticated attackers to brute-force passwords protecting videos. The vulnerability exists in the get_api_video_password_is_correct API endpoint, which returns a boolean indicating password correctness without any rate limiting, CAPTCHA, or authentication. This enables attackers to perform offline-speed brute-force attacks to guess video passwords efficiently. The flaw is classified under CWE-307 (Improper Restriction of Excessive Authentication Attempts). A patch addressing this issue is available in a specific commit. No known exploits are currently reported in the wild. The vulnerability impacts confidentiality but not integrity or availability, and requires no user interaction or privileges to exploit.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 15:01:07 UTC

Technical Analysis

WWBN AVideo is an open-source video platform that supports password-protected videos. In versions up to and including 26.0, the API endpoint get_api_video_password_is_correct allows any unauthenticated user to verify if a given password is correct for any password-protected video. The endpoint responds with a boolean field passwordIsCorrect without enforcing any rate limiting, CAPTCHA challenges, or authentication requirements. This design flaw constitutes an improper restriction of excessive authentication attempts (CWE-307), enabling attackers to perform brute-force attacks at offline speeds against video passwords. Because the endpoint provides immediate feedback on password correctness, attackers can automate password guessing attempts rapidly and efficiently. The vulnerability affects confidentiality by potentially exposing protected video content to unauthorized users. The issue has been patched in a commit identified as 01a0614fedcdaee47832c0d913a0fb86d8c28135. The CVSS v3.1 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and limited confidentiality impact. No known exploits have been reported in the wild to date.

Potential Impact

The primary impact of this vulnerability is the compromise of confidentiality for password-protected videos hosted on vulnerable WWBN AVideo instances. Attackers can gain unauthorized access to protected video content by brute-forcing passwords without detection or mitigation controls. This can lead to exposure of sensitive or proprietary video content, intellectual property theft, privacy violations, or reputational damage for organizations relying on AVideo for secure video delivery. Since the vulnerability does not affect integrity or availability, the core platform functionality remains intact, but unauthorized content access can have significant business and legal consequences. The lack of rate limiting and authentication requirements increases the risk of large-scale automated attacks, especially against weak or commonly used passwords. Organizations using AVideo in sectors such as education, media, corporate training, or healthcare may face increased risk due to the sensitive nature of video content. The absence of known exploits in the wild suggests limited active exploitation currently, but the vulnerability’s ease of exploitation and direct impact on confidentiality warrant prompt remediation.

Mitigation Recommendations

Organizations should immediately upgrade WWBN AVideo to a version that includes the patch from commit 01a0614fedcdaee47832c0d913a0fb86d8c28135 or later. If upgrading is not immediately possible, implement compensating controls such as: 1) Deploying web application firewalls (WAFs) to detect and block rapid repeated requests to the get_api_video_password_is_correct endpoint. 2) Introducing custom rate limiting or CAPTCHA mechanisms at the API gateway or reverse proxy level to throttle brute-force attempts. 3) Enforcing strong password policies for video passwords, including minimum length and complexity requirements, to reduce brute-force feasibility. 4) Monitoring logs for abnormal access patterns or repeated password verification attempts and alerting security teams. 5) Restricting API endpoint access via network segmentation or IP whitelisting where feasible. 6) Educating users and administrators about the risks of weak passwords and the importance of timely patching. These measures, combined with patching, will significantly reduce the risk of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T18:30:14.126Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c697e13c064ed76fb722a4

Added to database: 3/27/2026, 2:44:49 PM

Last enriched: 3/27/2026, 3:01:07 PM

Last updated: 3/27/2026, 5:08:31 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses