← Zuruck zu CVEs
CVE-2026-33685
MEDIUM5.3
Beschreibung
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/AD_Server/reports.json.php` endpoint performs no authentication or authorization checks, allowing any unauthenticated attacker to extract ad campaign analytics data including video titles, user channel names, user IDs, ad campaign names, and impression/click counts. The HTML counterpart (`reports.php`) and CSV export (`getCSV.php`) both correctly enforce `User::isAdmin()`, but the JSON API was left unprotected. Commit daca4ffb1ce19643eecaa044362c41ac2ce45dde contains a patch.
CVE Details
CVSS v3.1 Bewertung5.3
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht3/23/2026
Zuletzt geandert3/25/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
wwbn:avideo
Schwachen (CWE)
CWE-862
Referenzen
https://github.com/WWBN/AVideo/commit/daca4ffb1ce19643eecaa044362c41ac2ce45dde(security-advisories@github.com)
https://github.com/WWBN/AVideo/security/advisories/GHSA-j36m-74g2-7m95(security-advisories@github.com)
https://github.com/WWBN/AVideo/security/advisories/GHSA-j36m-74g2-7m95(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.