Wwbn

Avideo

164 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.05%
  • Veröffentlicht 22.03.2026 16:26:08
  • Zuletzt bearbeitet 23.03.2026 16:18:24

WWBN AVideo is an open source video platform. Prior to version 26.0, the HLS streaming endpoint (`view/hls.php`) is vulnerable to a path traversal attack that allows an unauthenticated attacker to stream any private or paid video on the platform. The...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 20.03.2026 23:31:35
  • Zuletzt bearbeitet 13.04.2026 18:16:29

WWBN AVideo is an open source video platform. Prior to version 26.0, the `listFiles.json.php` endpoint accepts a `path` POST parameter and passes it directly to `glob()` without restricting the path to an allowed base directory. An authenticated uplo...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 20.03.2026 23:30:04
  • Zuletzt bearbeitet 13.04.2026 18:16:29

WWBN AVideo is an open source video platform. Prior to version 26.0, the Scheduler plugin's `run()` function in `plugin/Scheduler/Scheduler.php` calls `url_get_contents()` with an admin-configurable `callbackURL` that is validated only by `isValidURL...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 20.03.2026 05:52:59
  • Zuletzt bearbeitet 23.03.2026 15:28:09

WWBN AVideo is an open source video platform. In versions 25.0 and below, /objects/phpsessionid.json.php exposes the current PHP session ID to any unauthenticated request. The allowOrigin() function reflects any Origin header back in Access-Control-A...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 20.03.2026 05:50:07
  • Zuletzt bearbeitet 23.03.2026 16:15:03

WWBN AVideo is an open source video platform. In versions 25.0 and below, /objects/encryptPass.json.php exposes the application's password hashing algorithm to any unauthenticated user. An attacker can submit arbitrary passwords and receive their has...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 20.03.2026 05:38:50
  • Zuletzt bearbeitet 23.03.2026 16:22:49

WWBN AVideo is an open source video platform. In versions 25.0 and below, the plugin/LiveLinks/proxy.php endpoint validates user-supplied URLs against internal/private networks using isSSRFSafeURL(), but only checks the initial URL. When the initial ...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 20.03.2026 05:35:56
  • Zuletzt bearbeitet 23.03.2026 16:24:08

WWBN AVideo is an open source video platform. Versions 25.0 and below are vulnerable to unauthenticated application takeover through the install/checkConfiguration.php endpoint. install/checkConfiguration.php performs full application initialization:...

Exploit
  • EPSS 0.33%
  • Veröffentlicht 20.03.2026 05:25:49
  • Zuletzt bearbeitet 23.03.2026 16:25:29

WWBN AVideo is an open source video platform. In versions 25.0 and below, the official Docker deployment files (docker-compose.yml, env.example) ship with the admin password set to "password", which is automatically used to seed the admin account dur...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 20.03.2026 05:08:31
  • Zuletzt bearbeitet 24.03.2026 16:30:45

WWBN AVideo is an open source video platform. In versions 25.0 and below, there is a reflected XSS vulnerability that allows unauthenticated attackers to execute arbitrary JavaScript in a victim's browser. User input from a URL parameter flows throug...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 09.03.2026 22:35:59
  • Zuletzt bearbeitet 13.03.2026 15:20:47

WWBN AVideo is an open source video platform. Prior to 25.0, the /objects/playlistsFromUser.json.php endpoint returns all playlists for any user without requiring authentication or authorization. An unauthenticated attacker can enumerate user IDs and...