Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34362: CWE-613: Insufficient Session Expiration in WWBN AVideo

0
Medium
VulnerabilityCVE-2026-34362cvecve-2026-34362cwe-613
Published: Fri Mar 27 2026 (03/27/2026, 16:42:28 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-34362 is a medium-severity vulnerability in WWBN AVideo versions up to 26. 0 where WebSocket tokens never expire due to disabled timeout validation. This flaw allows attackers with captured or legitimate tokens to maintain indefinite WebSocket access, even after user account changes such as deletion or demotion. Admin tokens are especially sensitive, exposing real-time connection data including IP addresses, browser details, and page locations of all online users. The vulnerability arises from the commented-out token timeout check in the verifyTokenSocket() function. Although no known exploits are reported, the risk of persistent unauthorized access is significant. The issue is fixed in a later commit, and users should update promptly to mitigate risk. Organizations using AVideo should review token management and session expiration policies to prevent abuse.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 17:15:36 UTC

Technical Analysis

CVE-2026-34362 affects WWBN AVideo, an open-source video platform, specifically versions up to and including 26.0. The vulnerability stems from the verifyTokenSocket() function in plugin/YPTSocket/functions.php, where the token timeout validation code has been commented out. Although tokens are generated with a 12-hour timeout, this disabled validation causes tokens to effectively never expire. As a result, any WebSocket token—whether captured through interception or legitimately obtained—can be reused indefinitely to access WebSocket connections. This persistent access remains valid even if the associated user account is deleted, banned, or demoted from administrative privileges. The impact is particularly severe for admin tokens, which grant access to sensitive real-time data such as IP addresses, browser information, and page locations of all online users connected via WebSocket. The vulnerability is classified under CWE-613 (Insufficient Session Expiration), highlighting a failure in enforcing proper session lifecycle management. The issue was addressed in commit 5d5237121bf82c24e9e0fdd5bc1699f1157783c5, which restores token timeout validation. The CVSS v3.1 base score is 5.4 (medium), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and limited confidentiality and integrity impact without availability impact. No known exploits are currently reported in the wild.

Potential Impact

The vulnerability allows attackers to maintain indefinite WebSocket access using stolen or legitimate tokens, bypassing normal session expiration controls. This persistent access can lead to unauthorized monitoring of real-time user connection data, including sensitive metadata such as IP addresses, browser fingerprints, and page navigation details. For administrators, compromised tokens could expose the entire user base's online activity, potentially facilitating further targeted attacks or privacy violations. The inability to revoke tokens upon user account changes (deletion, banning, or privilege demotion) exacerbates the risk, as attackers retain access despite administrative actions. Organizations relying on AVideo for video streaming or conferencing may face data confidentiality breaches and erosion of user trust. Although availability is not directly impacted, the exposure of sensitive information and potential for privilege escalation represent significant security concerns. The medium severity rating indicates a moderate but actionable threat, especially for deployments with high-value or sensitive user data.

Mitigation Recommendations

1. Immediately update AVideo installations to versions including the fix from commit 5d5237121bf82c24e9e0fdd5bc1699f1157783c5 or later to restore proper token timeout validation. 2. Audit existing WebSocket tokens and revoke or invalidate all active tokens issued before the patch to prevent continued unauthorized access. 3. Implement additional monitoring on WebSocket connections to detect unusual or persistent sessions that may indicate token misuse. 4. Enforce strict session management policies, including token expiration and revocation tied to user account status changes (deletion, banning, privilege changes). 5. Consider deploying Web Application Firewalls (WAFs) or network-level controls to limit WebSocket traffic to trusted clients and IP ranges. 6. Educate administrators and users on secure token handling and the risks of token leakage. 7. Regularly review and test session management mechanisms to ensure compliance with security best practices and prevent similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-27T13:43:14.368Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c6b7823c064ed76fc77db6

Added to database: 3/27/2026, 4:59:46 PM

Last enriched: 3/27/2026, 5:15:36 PM

Last updated: 3/27/2026, 6:02:10 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses