CVE-2026-33492
Received Received - Intake
Session Fixation in WWBN AVideo Allows Authenticated Session Hijacking

Publication date: 2026-03-23

Last updated on: 2026-03-24

Assigner: GitHub, Inc.

Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, AVideo's `_session_start()` function accepts arbitrary session IDs via the `PHPSESSID` GET parameter and sets them as the active PHP session. A session regeneration bypass exists for specific blacklisted endpoints when the request originates from the same domain. Combined with the explicitly disabled session regeneration in `User::login()`, this allows a classic session fixation attack where an attacker can fix a victim's session ID before authentication and then hijack the authenticated session. Commit 5647a94d79bf69a972a86653fe02144079948785 contains a patch.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-23
Last Modified
2026-03-24
Generated
2026-05-07
AI Q&A
2026-03-23
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wwbn avideo to 26.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-384 Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2026-33492 is a session fixation vulnerability in the WWBN AVideo platform (versions up to 26.0). The vulnerability arises because the platform's `_session_start()` function accepts arbitrary session IDs via the `PHPSESSID` GET parameter, allowing an attacker to set a victim's session ID before authentication."}, {'type': 'paragraph', 'content': 'Additionally, session ID regeneration is bypassed for certain blacklisted endpoints when requests come from the same domain, and session regeneration is explicitly disabled during user login. This combination allows an attacker to fix a session ID for a victim, who then logs in with that fixed session, enabling the attacker to hijack the authenticated session.'}, {'type': 'paragraph', 'content': 'Other factors worsening the issue include exposure of session IDs to same-origin JavaScript and lack of binding sessions to IP addresses or user agents, making session hijacking easier.'}] [1]


How can this vulnerability impact me? :

This vulnerability can lead to full account takeover, including administrator accounts, allowing attackers to access private videos, messages, and personal data.

Attackers can escalate privileges and gain full administrative control, enabling them to perform any action as the victim, such as modifying content and changing settings.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for the presence of the PHPSESSID parameter in GET requests to the AVideo platform, especially if session IDs are being accepted via URL parameters instead of cookies.'}, {'type': 'paragraph', 'content': 'You can inspect HTTP requests to check if session IDs are being passed in URLs and if session regeneration is disabled on login or certain endpoints.'}, {'type': 'paragraph', 'content': 'Suggested commands include using network traffic analysis tools like tcpdump or Wireshark to capture HTTP requests and grep or similar tools to filter for PHPSESSID in URLs.'}, {'type': 'list_item', 'content': "tcpdump -i <interface> -A 'tcp port 80 or tcp port 443' | grep 'PHPSESSID='"}, {'type': 'list_item', 'content': "grep -r 'PHPSESSID' /path/to/avideo/logs/access.log"}, {'type': 'list_item', 'content': 'Review application logs or web server logs for GET requests containing PHPSESSID parameters.'}, {'type': 'paragraph', 'content': 'Additionally, checking the source code or runtime behavior to verify if session regeneration is disabled on login or blacklisted endpoints can help detect the vulnerability.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Re-enable session ID regeneration on user login by uncommenting or adding the call to _session_regenerate_id() in the User::login() function.
  • Remove or restrict acceptance of session IDs via GET parameters (PHPSESSID) to prevent attackers from fixing session IDs through URLs.
  • Eliminate exposure of session IDs to JavaScript by removing endpoints like objects/phpsessionid.json.php and avoiding storing session IDs in global JavaScript variables.
  • Implement validation of session IDs to ensure they conform to expected formats before accepting them.

These steps prevent attackers from fixing session IDs before authentication and protect against session hijacking.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart