CVE-2026-33649
CSRF Vulnerability in WWBN AVideo Enables Permission Escalation
Publication date: 2026-03-23
Last updated on: 2026-03-25
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wwbn | avideo | to 26.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-33649 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability in the WWBN AVideo platform affecting versions up to 27.0. The vulnerability exists in the endpoint plugin/Permissions/setPermission.json.php, which improperly accepts GET requests to perform state-changing operations that modify user group permissions without validating CSRF tokens.
The endpoint uses $_REQUEST instead of $_POST, allowing GET parameters to trigger permission changes. It lacks CSRF token validation and only checks if the user is an admin, which does not prevent CSRF attacks. Additionally, session cookies are set with SameSite=null and Secure=1, causing the adminβs session cookie to be sent with cross-origin GET requests.
An attacker can craft a malicious webpage containing multiple <img> tags with src attributes pointing to the vulnerable endpoint, passing parameters to grant various permissions to the attackerβs user group. When an admin visits this page, the browser automatically sends GET requests with the adminβs session cookie, allowing the attacker to escalate privileges to near-admin levels without having admin credentials.
How can this vulnerability impact me? :
This vulnerability allows an attacker to escalate their privileges from a low-privileged user to near-admin access by silently granting arbitrary permissions to their user group.
- The attacker can gain permissions such as full video access, user management, video upload, and livestream capabilities.
- All users in the compromised group gain escalated permissions, increasing the potential damage.
The attack requires no user interaction beyond the admin visiting a malicious page, making it easy to execute via social engineering.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for suspicious GET requests to the endpoint `plugin/Permissions/setPermission.json.php` that include parameters attempting to modify user group permissions.'}, {'type': 'paragraph', 'content': 'Since the endpoint improperly accepts GET requests for state-changing operations, you can look for unusual GET requests with parameters related to permission changes in your web server logs or network traffic.'}, {'type': 'list_item', 'content': 'Use tools like tcpdump or Wireshark to capture HTTP GET requests targeting `plugin/Permissions/setPermission.json.php`.'}, {'type': 'list_item', 'content': "Example command to search web server logs for suspicious GET requests (assuming Apache logs): `grep 'GET /plugin/Permissions/setPermission.json.php' /var/log/apache2/access.log`"}, {'type': 'list_item', 'content': 'Look for GET requests containing parameters such as permission types (e.g., `type=10`, `type=20`, `type=70`, `type=80`) and user group IDs (small integers like 1-3).'}, {'type': 'list_item', 'content': 'Monitor for unexpected permission changes in the application, especially if triggered by GET requests without CSRF tokens.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting the vulnerable endpoint to accept only POST requests and enforcing CSRF token validation.
Specifically:
- Modify the `plugin/Permissions/setPermission.json.php` endpoint to reject GET requests and accept only POST requests.
- Implement CSRF token validation by calling `isGlobalTokenValid()` before processing permission changes.
- Replace usage of `$_REQUEST` with `$_POST` to ensure parameters are only accepted from POST data.
- Ensure AJAX calls include the global CSRF token in their POST data.
Until a patched version is available, consider limiting admin access to trusted networks and educating admins to avoid visiting untrusted or suspicious web pages.