CVE-2026-33690
Received Received - Intake
IP Spoofing via Header Trust in WWBN AVideo Function

Publication date: 2026-03-23

Last updated on: 2026-03-25

Assigner: GitHub, Inc.

Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `getRealIpAddr()` function in `objects/functions.php` trusts user-controlled HTTP headers to determine the client's IP address. An attacker can spoof their IP address by sending forged headers, bypassing any IP-based access controls or audit logging. Commit 1a1df6a9377e5cc67d1d0ac8ef571f7abbffbc6c contains a patch.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-23
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2026-03-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wwbn avideo to 26.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-348 The product has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to spoof their IP address, which can lead to several security issues.

  • Bypassing IP-based access controls, allowing unauthorized access to restricted resources.
  • Evading IP-based rate limiting, potentially enabling denial-of-service attacks or abuse of resources.
  • Circumventing audit logging by hiding the true origin of requests, complicating incident response and forensic analysis.
  • Potential privilege escalation if the system trusts certain IP addresses (e.g., localhost) for elevated permissions.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability can be detected by checking if the server is accepting and trusting user-controlled HTTP headers such as 'X-Client-IP', 'X-Real-IP', 'X-Forwarded-For', or 'Client-IP' to determine the client's IP address."}, {'type': 'paragraph', 'content': 'A practical way to test this is to send HTTP requests with forged headers and observe if the server logs or access controls reflect the spoofed IP address.'}, {'type': 'paragraph', 'content': 'For example, you can use the following curl command to send a request with a spoofed IP header:'}, {'type': 'list_item', 'content': 'curl -H "X-Client-IP: 127.0.0.1" https://target.com/any_endpoint.php'}, {'type': 'paragraph', 'content': 'If the server treats this request as coming from 127.0.0.1 (localhost) in logs or access control decisions, it indicates the vulnerability is present.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'Immediate mitigation involves not trusting user-controlled HTTP headers for IP address determination.'}, {'type': 'paragraph', 'content': 'Specifically, you should:'}, {'type': 'list_item', 'content': "Avoid using headers like 'X-Client-IP', 'X-Real-IP', 'X-Forwarded-For', or 'Client-IP' directly to determine client IPs without validation."}, {'type': 'list_item', 'content': "Implement strict validation of IP addresses using reliable methods such as PHP's filter_var() with FILTER_VALIDATE_IP and checks to exclude private or loopback IP ranges."}, {'type': 'list_item', 'content': 'Apply the patch from commit 1a1df6a9377e5cc67d1d0ac8ef571f7abbffbc6c which refactors IP retrieval functions to improve security and prevent spoofing.'}, {'type': 'paragraph', 'content': 'Until the patch is applied, consider restricting access controls and audit logging to rely on the REMOTE_ADDR server variable only, and be cautious about trusting forwarded headers.'}] [2]


Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2026-33690 is an IP address spoofing vulnerability in the WWBN AVideo platform (versions up to 26.0). The vulnerability exists because the function getRealIpAddr() trusts user-controlled HTTP headers such as 'HTTP_X_REAL_IP', 'HTTP_CLIENT_IP', and 'HTTP_X_FORWARDED_FOR' to determine the client's IP address."}, {'type': 'paragraph', 'content': 'An attacker can send forged headers with fake IP addresses, causing the system to believe the request originates from a different IP. This allows the attacker to bypass IP-based access controls, rate limiting, and audit logging.'}, {'type': 'paragraph', 'content': "For example, an attacker can send a request with a header like 'X-Client-IP: 127.0.0.1' to make the server think the request is coming from localhost, potentially escalating privileges if certain IPs are trusted."}] [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart