CVE-2026-33651
- EPSS 0.03%
- Veröffentlicht 23.03.2026 18:38:22
- Zuletzt bearbeitet 25.03.2026 18:02:12
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `remindMe.json.php` endpoint passes `$_REQUEST['live_schedule_id']` through multiple functions without sanitization until it reaches `Scheduler_commands::getAllAc...
CVE-2026-33650
- EPSS 0.03%
- Veröffentlicht 23.03.2026 18:28:13
- Zuletzt bearbeitet 25.03.2026 18:00:14
WWBN AVideo is an open source video platform. In versions up to and including 26.0, a user with the "Videos Moderator" permission can escalate privileges to perform full video management operations — including ownership transfer and deletion of any v...
CVE-2026-33649
- EPSS 0.02%
- Veröffentlicht 23.03.2026 18:26:32
- Zuletzt bearbeitet 25.03.2026 14:54:19
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/Permissions/setPermission.json.php` endpoint accepts GET parameters for a state-changing operation that modifies user group permissions. The endpoint has ...
CVE-2026-33648
- EPSS 0.07%
- Veröffentlicht 23.03.2026 18:25:07
- Zuletzt bearbeitet 25.03.2026 17:55:16
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the restreamer endpoint constructs a log file path by embedding user-controlled `users_id` and `liveTransmitionHistory_id` values from the JSON request body without a...
CVE-2026-33647
- EPSS 0.29%
- Veröffentlicht 23.03.2026 18:23:20
- Zuletzt bearbeitet 25.03.2026 17:54:10
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `ImageGallery::saveFile()` method validates uploaded file content using `finfo` MIME type detection but derives the saved filename extension from the user-supplie...
CVE-2026-33513
- EPSS 0.17%
- Veröffentlicht 23.03.2026 18:21:59
- Zuletzt bearbeitet 25.03.2026 17:52:58
WWBN AVideo is an open source video platform. In versions up to and including 26.0, an unauthenticated API endpoint (`APIName=locale`) concatenates user input into an `include` path with no canonicalization or whitelist. Path traversal is accepted, s...
CVE-2026-33512
- EPSS 0.02%
- Veröffentlicht 23.03.2026 18:17:47
- Zuletzt bearbeitet 25.03.2026 17:51:40
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the API plugin exposes a `decryptString` action without any authentication. Anyone can submit ciphertext and receive plaintext. Ciphertext is issued publicly (e.g., `...
CVE-2026-33507
- EPSS 0.06%
- Veröffentlicht 23.03.2026 16:32:28
- Zuletzt bearbeitet 24.03.2026 16:55:37
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `objects/pluginImport.json.php` endpoint allows admin users to upload and install plugin ZIP files containing executable PHP code, but lacks any CSRF protection. ...
CVE-2026-33502
- EPSS 0.05%
- Veröffentlicht 23.03.2026 16:29:47
- Zuletzt bearbeitet 24.03.2026 17:01:02
WWBN AVideo is an open source video platform. In versions up to and including 26.0, an unauthenticated server-side request forgery vulnerability in `plugin/Live/test.php` allows any remote user to make the AVideo server send HTTP requests to arbitrar...
CVE-2026-33501
- EPSS 0.15%
- Veröffentlicht 23.03.2026 16:28:20
- Zuletzt bearbeitet 24.03.2026 18:08:01
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the endpoint `plugin/Permissions/View/Users_groups_permissions/list.json.php` lacks any authentication or authorization check, allowing unauthenticated users to retri...