CVE-2026-34369: CWE-862: Missing Authorization in WWBN AVideo
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `get_api_video_file` and `get_api_video` API endpoints in AVideo return full video playback sources (direct MP4 URLs, HLS manifests) for password-protected videos without verifying the video password. While the normal web playback flow enforces password checks via the `CustomizeUser::getModeYouTube()` hook, this enforcement is completely absent from the API code path. An unauthenticated attacker can retrieve direct playback URLs for any password-protected video by calling the API directly. Commit be344206f2f461c034ad2f1c5d8212dd8a52b8c7 fixes the issue.
AI Analysis
Technical Summary
WWBN AVideo is an open-source video platform that supports password-protected videos to restrict access. In versions up to and including 26.0, the API endpoints get_api_video_file and get_api_video return direct video playback sources such as MP4 URLs and HLS manifests without performing password verification. While the standard web playback flow enforces password protection through the CustomizeUser::getModeYouTube() hook, this authorization check is missing in the API endpoints. Consequently, an unauthenticated attacker can bypass password restrictions by directly invoking these API endpoints, gaining access to the raw video streams. This represents a missing authorization vulnerability classified under CWE-862. The vulnerability impacts confidentiality by exposing protected video content but does not affect integrity or availability. The CVSS v3.1 score is 5.3 (medium), reflecting the ease of exploitation (no authentication or user interaction required) and limited impact scope (confidentiality only). The issue has been addressed in a code commit (be344206f2f461c034ad2f1c5d8212dd8a52b8c7), which adds proper authorization checks to the API endpoints. There are no known exploits in the wild at this time.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of confidential video content that was intended to be protected by passwords. Organizations using AVideo to host sensitive or private videos risk exposure of this content to any unauthenticated attacker who can access the API endpoints. This can lead to privacy violations, intellectual property theft, and reputational damage. Since the vulnerability does not affect video integrity or service availability, the impact is limited to confidentiality breaches. However, for organizations relying on AVideo for secure video delivery—such as educational institutions, media companies, or enterprises sharing proprietary content—the unauthorized access to protected videos can have significant business and legal consequences. The ease of exploitation (no authentication or user interaction required) increases the risk of automated scraping or mass data leakage. Although no exploits are currently known in the wild, the public disclosure and availability of a fix mean attackers could develop exploits rapidly if patches are not applied.
Mitigation Recommendations
Organizations should immediately upgrade AVideo to a version that includes the fix for CVE-2026-34369 or apply the patch commit be344206f2f461c034ad2f1c5d8212dd8a52b8c7 to enforce authorization checks on the get_api_video_file and get_api_video API endpoints. Until patched, administrators should consider disabling or restricting access to these API endpoints via network controls or API gateways to prevent unauthenticated calls. Implementing additional access controls such as IP whitelisting or requiring authentication tokens for API access can mitigate unauthorized retrieval. Monitoring API usage logs for unusual or unauthorized access patterns can help detect exploitation attempts. Reviewing and strengthening overall API security posture, including rate limiting and anomaly detection, is recommended. Finally, organizations should audit all password-protected videos to assess potential exposure and consider reissuing passwords or re-encoding videos if unauthorized access is suspected.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, India, Brazil, Netherlands
CVE-2026-34369: CWE-862: Missing Authorization in WWBN AVideo
Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `get_api_video_file` and `get_api_video` API endpoints in AVideo return full video playback sources (direct MP4 URLs, HLS manifests) for password-protected videos without verifying the video password. While the normal web playback flow enforces password checks via the `CustomizeUser::getModeYouTube()` hook, this enforcement is completely absent from the API code path. An unauthenticated attacker can retrieve direct playback URLs for any password-protected video by calling the API directly. Commit be344206f2f461c034ad2f1c5d8212dd8a52b8c7 fixes the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
WWBN AVideo is an open-source video platform that supports password-protected videos to restrict access. In versions up to and including 26.0, the API endpoints get_api_video_file and get_api_video return direct video playback sources such as MP4 URLs and HLS manifests without performing password verification. While the standard web playback flow enforces password protection through the CustomizeUser::getModeYouTube() hook, this authorization check is missing in the API endpoints. Consequently, an unauthenticated attacker can bypass password restrictions by directly invoking these API endpoints, gaining access to the raw video streams. This represents a missing authorization vulnerability classified under CWE-862. The vulnerability impacts confidentiality by exposing protected video content but does not affect integrity or availability. The CVSS v3.1 score is 5.3 (medium), reflecting the ease of exploitation (no authentication or user interaction required) and limited impact scope (confidentiality only). The issue has been addressed in a code commit (be344206f2f461c034ad2f1c5d8212dd8a52b8c7), which adds proper authorization checks to the API endpoints. There are no known exploits in the wild at this time.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of confidential video content that was intended to be protected by passwords. Organizations using AVideo to host sensitive or private videos risk exposure of this content to any unauthenticated attacker who can access the API endpoints. This can lead to privacy violations, intellectual property theft, and reputational damage. Since the vulnerability does not affect video integrity or service availability, the impact is limited to confidentiality breaches. However, for organizations relying on AVideo for secure video delivery—such as educational institutions, media companies, or enterprises sharing proprietary content—the unauthorized access to protected videos can have significant business and legal consequences. The ease of exploitation (no authentication or user interaction required) increases the risk of automated scraping or mass data leakage. Although no exploits are currently known in the wild, the public disclosure and availability of a fix mean attackers could develop exploits rapidly if patches are not applied.
Mitigation Recommendations
Organizations should immediately upgrade AVideo to a version that includes the fix for CVE-2026-34369 or apply the patch commit be344206f2f461c034ad2f1c5d8212dd8a52b8c7 to enforce authorization checks on the get_api_video_file and get_api_video API endpoints. Until patched, administrators should consider disabling or restricting access to these API endpoints via network controls or API gateways to prevent unauthenticated calls. Implementing additional access controls such as IP whitelisting or requiring authentication tokens for API access can mitigate unauthorized retrieval. Monitoring API usage logs for unusual or unauthorized access patterns can help detect exploitation attempts. Reviewing and strengthening overall API security posture, including rate limiting and anomaly detection, is recommended. Finally, organizations should audit all password-protected videos to assess potential exposure and consider reissuing passwords or re-encoding videos if unauthorized access is suspected.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-27T13:43:14.369Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c6d01e3c064ed76fe28e11
Added to database: 3/27/2026, 6:44:46 PM
Last enriched: 3/27/2026, 7:00:43 PM
Last updated: 3/28/2026, 1:08:13 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.