Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34731: CWE-306: Missing Authentication for Critical Function in WWBN AVideo

0
High
VulnerabilityCVE-2026-34731cvecve-2026-34731cwe-306
Published: Tue Mar 31 2026 (03/31/2026, 20:50:23 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-34731 is a high-severity vulnerability in WWBN AVideo versions 26. 0 and earlier, where the on_publish_done. php endpoint in the Live plugin lacks authentication. This flaw allows unauthenticated attackers to terminate any active live stream by sending crafted POST requests, resulting in denial-of-service against live broadcasts. Attackers can first enumerate active stream keys via the unauthenticated stats. json. php endpoint, then exploit the missing authentication to stop streams. No patches are currently available, and exploitation requires no privileges or user interaction. The vulnerability impacts the availability of live streaming functionality but does not affect confidentiality or integrity. Organizations using AVideo for live streaming should urgently implement mitigations to prevent disruption.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 21:23:24 UTC

Technical Analysis

CVE-2026-34731 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting WWBN AVideo, an open-source video platform widely used for live streaming. In versions 26.0 and prior, the Live plugin's on_publish_done.php endpoint processes RTMP callback events to mark live streams as finished in the backend database. However, this endpoint does not perform any authentication or authorization checks, allowing any unauthenticated user to send POST requests to terminate active live streams arbitrarily. Attackers can first enumerate active stream keys by accessing the unauthenticated stats.json.php endpoint, which exposes stream keys publicly. With these keys, attackers craft POST requests to on_publish_done.php to forcibly end live broadcasts, effectively causing denial-of-service (DoS) on the live streaming service. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting high severity due to its ease of exploitation (no privileges or user interaction required) and complete impact on availability of live streams. No confidentiality or integrity impact is noted. At the time of disclosure, no patches or official fixes are available, increasing the urgency for organizations to apply mitigations. This vulnerability threatens the reliability and availability of live streaming services hosted on AVideo platforms, potentially disrupting business operations, user engagement, and content delivery.

Potential Impact

The primary impact of CVE-2026-34731 is a denial-of-service condition against live streaming functionality on affected AVideo platforms. Organizations relying on AVideo for live broadcasts, including media companies, educational institutions, event organizers, and content creators, may experience service interruptions, loss of audience trust, and reputational damage. The ability for unauthenticated attackers to terminate any active stream without detection or authorization can lead to repeated disruptions and potential financial losses, especially for revenue-generating live events. Although confidentiality and integrity are not directly compromised, the availability impact alone can severely affect operational continuity and user experience. Additionally, the public exposure of active stream keys via the stats.json.php endpoint increases the attack surface and facilitates exploitation. The lack of patches means organizations must rely on mitigations until an official fix is released. This vulnerability could also be leveraged in broader attack campaigns targeting live streaming infrastructure, amplifying its impact.

Mitigation Recommendations

To mitigate CVE-2026-34731, organizations should implement the following specific measures: 1) Restrict access to the on_publish_done.php and stats.json.php endpoints by enforcing IP whitelisting or network-level access controls to trusted RTMP servers or internal systems only. 2) Deploy web application firewalls (WAFs) with custom rules to detect and block unauthorized POST requests to on_publish_done.php and enumeration attempts on stats.json.php. 3) Temporarily disable or remove the Live plugin if live streaming is not critical or can be paused until a patch is available. 4) Monitor logs for unusual or repeated POST requests to on_publish_done.php and anomalous access patterns to stats.json.php to detect potential exploitation attempts. 5) Consider implementing additional authentication or token-based validation at the application or reverse proxy level for RTMP callback endpoints. 6) Engage with WWBN and community forums to track patch releases and apply updates promptly once available. 7) Educate operational teams about this vulnerability and establish incident response plans for live stream disruptions. These targeted mitigations go beyond generic advice by focusing on access control, monitoring, and temporary disabling of vulnerable components.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-30T18:41:20.754Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cc37c1e6bfc5ba1d418a01

Added to database: 3/31/2026, 9:08:17 PM

Last enriched: 3/31/2026, 9:23:24 PM

Last updated: 4/1/2026, 5:18:33 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses