← Back to CVEs
CVE-2026-33685
MEDIUM5.3
Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/AD_Server/reports.json.php` endpoint performs no authentication or authorization checks, allowing any unauthenticated attacker to extract ad campaign analytics data including video titles, user channel names, user IDs, ad campaign names, and impression/click counts. The HTML counterpart (`reports.php`) and CSV export (`getCSV.php`) both correctly enforce `User::isAdmin()`, but the JSON API was left unprotected. Commit daca4ffb1ce19643eecaa044362c41ac2ce45dde contains a patch.
CVE Details
CVSS v3.1 Score5.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/23/2026
Last Modified3/25/2026
Sourcenvd
Honeypot Sightings0
Affected Products
wwbn:avideo
Weaknesses (CWE)
CWE-862
References
https://github.com/WWBN/AVideo/commit/daca4ffb1ce19643eecaa044362c41ac2ce45dde(security-advisories@github.com)
https://github.com/WWBN/AVideo/security/advisories/GHSA-j36m-74g2-7m95(security-advisories@github.com)
https://github.com/WWBN/AVideo/security/advisories/GHSA-j36m-74g2-7m95(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.