CVE-2026-34368: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in WWBN AVideo
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `transferBalance()` method in `plugin/YPTWallet/YPTWallet.php` contains a Time-of-Check-Time-of-Use (TOCTOU) race condition. The method reads the sender's wallet balance, checks sufficiency in PHP, then writes the new balance — all without database transactions or row-level locking. An attacker with multiple authenticated sessions can send concurrent transfer requests that all read the same stale balance, each passing the balance check independently, resulting in only one deduction being applied while the recipient is credited multiple times. Commit 34132ad5159784bfc7ba0d7634bb5c79b769202d contains a fix.
AI Analysis
Technical Summary
WWBN AVideo's transferBalance() method in plugin/YPTWallet/YPTWallet.php suffers from a TOCTOU race condition due to lack of database transactions or row-level locking. The method reads the sender's wallet balance, checks if sufficient funds exist, then writes the new balance. Multiple concurrent authenticated requests can read the same stale balance and pass the check independently, resulting in only one deduction from the sender but multiple credits to the recipient. This vulnerability is tracked as CWE-362 (Concurrent Execution using Shared Resource with Improper Synchronization). The issue affects versions up to and including 26.0. A code commit (34132ad5159784bfc7ba0d7634bb5c79b769202d) reportedly contains a fix, but no official vendor advisory or patch link is provided.
Potential Impact
An attacker with multiple authenticated sessions can exploit this race condition to fraudulently increase the recipient's wallet balance without corresponding deductions from the sender. This leads to financial integrity issues within the platform, potentially causing monetary loss or accounting discrepancies. The CVSS score of 5.3 (medium severity) reflects the requirement for low privileges but high attack complexity and no confidentiality or availability impact.
Mitigation Recommendations
A fix is referenced in commit 34132ad5159784bfc7ba0d7634bb5c79b769202d, indicating that a code-level correction exists. However, patch status is not explicitly confirmed by a vendor advisory. Users should review this commit and apply the fix or upgrade to a version including this fix once officially released. Until then, limiting concurrent transfer requests per user session may reduce risk. Patch status is not yet confirmed — check the vendor advisory for current remediation guidance.
CVE-2026-34368: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in WWBN AVideo
Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `transferBalance()` method in `plugin/YPTWallet/YPTWallet.php` contains a Time-of-Check-Time-of-Use (TOCTOU) race condition. The method reads the sender's wallet balance, checks sufficiency in PHP, then writes the new balance — all without database transactions or row-level locking. An attacker with multiple authenticated sessions can send concurrent transfer requests that all read the same stale balance, each passing the balance check independently, resulting in only one deduction being applied while the recipient is credited multiple times. Commit 34132ad5159784bfc7ba0d7634bb5c79b769202d contains a fix.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
WWBN AVideo's transferBalance() method in plugin/YPTWallet/YPTWallet.php suffers from a TOCTOU race condition due to lack of database transactions or row-level locking. The method reads the sender's wallet balance, checks if sufficient funds exist, then writes the new balance. Multiple concurrent authenticated requests can read the same stale balance and pass the check independently, resulting in only one deduction from the sender but multiple credits to the recipient. This vulnerability is tracked as CWE-362 (Concurrent Execution using Shared Resource with Improper Synchronization). The issue affects versions up to and including 26.0. A code commit (34132ad5159784bfc7ba0d7634bb5c79b769202d) reportedly contains a fix, but no official vendor advisory or patch link is provided.
Potential Impact
An attacker with multiple authenticated sessions can exploit this race condition to fraudulently increase the recipient's wallet balance without corresponding deductions from the sender. This leads to financial integrity issues within the platform, potentially causing monetary loss or accounting discrepancies. The CVSS score of 5.3 (medium severity) reflects the requirement for low privileges but high attack complexity and no confidentiality or availability impact.
Mitigation Recommendations
A fix is referenced in commit 34132ad5159784bfc7ba0d7634bb5c79b769202d, indicating that a code-level correction exists. However, patch status is not explicitly confirmed by a vendor advisory. Users should review this commit and apply the fix or upgrade to a version including this fix once officially released. Until then, limiting concurrent transfer requests per user session may reduce risk. Patch status is not yet confirmed — check the vendor advisory for current remediation guidance.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-27T13:43:14.369Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c6c9173c064ed76fdf38a1
Added to database: 3/27/2026, 6:14:47 PM
Last enriched: 4/4/2026, 10:59:00 AM
Last updated: 5/11/2026, 5:23:18 AM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.