Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34733: CWE-284: Improper Access Control in WWBN AVideo

0
Medium
VulnerabilityCVE-2026-34733cvecve-2026-34733cwe-284
Published: Tue Mar 31 2026 (03/31/2026, 20:52:45 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-34733 is a medium severity improper access control vulnerability in WWBN AVideo versions 26. 0 and earlier. The vulnerability arises from a PHP operator precedence bug in the install/deleteSystemdPrivate. php script's CLI-only access guard, which incorrectly allows HTTP access to a script intended only for command-line execution. This flaw enables unauthenticated remote attackers to invoke the script via HTTP, causing deletion of files in the server's temporary directory and disclosure of its contents. No public patches are available at the time of disclosure, and no known exploits have been reported in the wild. The vulnerability impacts confidentiality and availability but does not affect integrity. Organizations using affected AVideo versions should restrict HTTP access to the vulnerable script and monitor for suspicious activity. Countries with significant AVideo deployments and open-source video platform usage are at higher risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 21:25:14 UTC

Technical Analysis

CVE-2026-34733 is an improper access control vulnerability in the open-source WWBN AVideo platform, specifically affecting versions 26.0 and prior. The root cause is a PHP operator precedence error in the install/deleteSystemdPrivate.php script, which is designed to be executed only from the command line interface (CLI). The script contains a guard condition intended to prevent web-based access: '!php_sapi_name() === 'cli''. However, due to PHP's operator precedence rules, the logical NOT operator (!) binds more tightly than the strict equality operator (===), causing the expression to always evaluate to false. Consequently, the die() statement that should block non-CLI access never executes, allowing the script to be accessed via HTTP without authentication. When accessed remotely, the script deletes files from the server's temporary directory and returns the directory contents in the HTTP response, leading to information disclosure and partial denial of service. The vulnerability does not require authentication or user interaction and can be exploited remotely with low complexity. At the time of publication, no patches or official fixes have been released, and there are no known active exploits. This vulnerability is classified under CWE-284 (Improper Access Control) and has a CVSS v3.1 base score of 6.5, reflecting medium severity with network attack vector, no privileges required, and no user interaction needed.

Potential Impact

The vulnerability impacts confidentiality by disclosing the contents of the server's temporary directory, potentially revealing sensitive information such as temporary files, credentials, or configuration data. It also impacts availability by deleting files in the temp directory, which may disrupt normal server operations or cause application instability. Although integrity is not directly affected, the deletion of files could indirectly lead to corrupted application states or data loss. The ease of exploitation (no authentication or user interaction required) and remote accessibility increase the risk of automated attacks or scanning by threat actors. Organizations running affected versions of AVideo may face service disruptions and data exposure, which could lead to reputational damage, compliance violations, and increased operational costs for remediation and recovery.

Mitigation Recommendations

Since no official patches are available, organizations should implement immediate compensating controls. First, restrict HTTP access to the install/deleteSystemdPrivate.php script by configuring web server rules (e.g., using .htaccess, nginx location blocks, or firewall rules) to deny all external requests to this path. Second, audit and monitor server temporary directories for unexpected file deletions or access patterns indicative of exploitation attempts. Third, consider isolating the AVideo installation environment to limit the impact of potential exploitation, such as running the application in a container or sandbox with restricted permissions. Fourth, review and correct any similar operator precedence issues in custom or third-party PHP scripts to prevent analogous vulnerabilities. Finally, maintain vigilance for updates from WWBN and apply official patches promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-30T18:41:20.754Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cc37c1e6bfc5ba1d418a07

Added to database: 3/31/2026, 9:08:17 PM

Last enriched: 3/31/2026, 9:25:14 PM

Last updated: 3/31/2026, 10:35:07 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses