CVE-2026-43881: CWE-306: Missing Authentication for Critical Function in WWBN AVideo
CVE-2026-43881 is a medium severity vulnerability in WWBN AVideo versions up to 29. 0 where two unauthenticated API paths expose user account information. The flaw allows unauthenticated users to bypass admin-only access controls and retrieve details such as user IDs, display names, channel URLs, photos, backgrounds, and status for all registered users. This occurs due to improper handling of the isCompany parameter and lack of permission checks on user ID queries. A code commit (d9cdc702481a626b15f814f6093f1e2a9c20d375) contains a fix, but no official patch or vendor advisory is currently provided. The vulnerability has a CVSS score of 5. 3, indicating moderate impact primarily on confidentiality. No known exploits are reported in the wild.
AI Analysis
Technical Summary
WWBN AVideo versions up to 29.0 contain a missing authentication vulnerability (CWE-306) in the objects/users.json.php endpoint. Two unauthenticated paths allow disclosure of user account data: one path uses the isCompany parameter to bypass admin checks by setting $ignoreAdmin=true for non-admin and unauthenticated callers, defeating the intended admin-only restriction in User::getAllUsers()/User::getTotalUsers(). The second path accepts a users_id parameter and calls User::getUserFromID() without permission verification, enabling retrieval of individual user details. Both paths return sensitive user attributes and total account counts. A code commit has been identified that addresses this issue, but no official patch or remediation guidance is currently available.
Potential Impact
The vulnerability allows unauthenticated attackers to obtain confidential user information including user IDs, display names, channel URLs, photos, backgrounds, and account status. This exposure compromises user privacy and could facilitate further targeted attacks or social engineering. There is no indication of impact on integrity or availability. No known exploits have been reported in the wild.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. A code commit (d9cdc702481a626b15f814f6093f1e2a9c20d375) reportedly fixes the issue, but no official patch or vendor advisory is currently available. Users should monitor WWBN communications for an official update and apply it once released. Until then, restrict access to the vulnerable endpoints if possible or implement additional access controls to prevent unauthenticated access.
CVE-2026-43881: CWE-306: Missing Authentication for Critical Function in WWBN AVideo
Description
CVE-2026-43881 is a medium severity vulnerability in WWBN AVideo versions up to 29. 0 where two unauthenticated API paths expose user account information. The flaw allows unauthenticated users to bypass admin-only access controls and retrieve details such as user IDs, display names, channel URLs, photos, backgrounds, and status for all registered users. This occurs due to improper handling of the isCompany parameter and lack of permission checks on user ID queries. A code commit (d9cdc702481a626b15f814f6093f1e2a9c20d375) contains a fix, but no official patch or vendor advisory is currently provided. The vulnerability has a CVSS score of 5. 3, indicating moderate impact primarily on confidentiality. No known exploits are reported in the wild.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
WWBN AVideo versions up to 29.0 contain a missing authentication vulnerability (CWE-306) in the objects/users.json.php endpoint. Two unauthenticated paths allow disclosure of user account data: one path uses the isCompany parameter to bypass admin checks by setting $ignoreAdmin=true for non-admin and unauthenticated callers, defeating the intended admin-only restriction in User::getAllUsers()/User::getTotalUsers(). The second path accepts a users_id parameter and calls User::getUserFromID() without permission verification, enabling retrieval of individual user details. Both paths return sensitive user attributes and total account counts. A code commit has been identified that addresses this issue, but no official patch or remediation guidance is currently available.
Potential Impact
The vulnerability allows unauthenticated attackers to obtain confidential user information including user IDs, display names, channel URLs, photos, backgrounds, and account status. This exposure compromises user privacy and could facilitate further targeted attacks or social engineering. There is no indication of impact on integrity or availability. No known exploits have been reported in the wild.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. A code commit (d9cdc702481a626b15f814f6093f1e2a9c20d375) reportedly fixes the issue, but no official patch or vendor advisory is currently available. Users should monitor WWBN communications for an official update and apply it once released. Until then, restrict access to the vulnerable endpoints if possible or implement additional access controls to prevent unauthenticated access.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-05-04T15:17:09.329Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 6a028749cbff5d86108b51a7
Added to database: 5/12/2026, 1:50:01 AM
Last enriched: 5/12/2026, 1:54:30 AM
Last updated: 5/12/2026, 3:49:35 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.