CVE-2026-34394
Received Received - Intake
CSRF Vulnerability in WWBN AVideo Admin Plugin Enables Full Takeover

Publication date: 2026-03-31

Last updated on: 2026-04-01

Assigner: GitHub, Inc.

Description
WWBN AVideo is an open source video platform. In versions 26.0 and prior, AVideo's admin plugin configuration endpoint (admin/save.json.php) lacks any CSRF token validation. There is no call to isGlobalTokenValid() or verifyToken() before processing the request. Combined with the application's explicit SameSite=None cookie policy, an attacker can forge cross-origin POST requests from a malicious page to overwrite arbitrary plugin settings on a victim administrator's session. Because the plugins table is included in the ignoreTableSecurityCheck() array in objects/Object.php, standard table-level access controls are also bypassed. This allows a complete takeover of platform functionality by reconfiguring payment processors, authentication providers, cloud storage credentials, and more. At time of publication, there are no publicly available patches.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-31
Last Modified
2026-04-01
Generated
2026-05-07
AI Q&A
2026-04-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wwbn avideo to 26.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the admin plugin configuration endpoint (admin/save.json.php) accepts POST requests without requiring a valid CSRF token.

One way to test this is to send a crafted POST request to the endpoint with arbitrary plugin configuration parameters and observe if the request is processed without CSRF token validation.

For example, you can use the following curl command to test the endpoint (replace URL and parameters accordingly):

  • curl -X POST -b "PHPSESSID=your_admin_session_cookie" -d "pluginName=attacker_plugin&pluginValue=malicious_value" https://your-avideo-instance/admin/save.json.php

If the request succeeds and plugin settings are changed without a CSRF token, the system is vulnerable.

Additionally, reviewing the source code of admin/save.json.php to verify the absence of calls to isGlobalTokenValid() or verifyToken() before processing POST requests can confirm the vulnerability.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including a complete takeover of the platform's functionality. An attacker can overwrite arbitrary plugin settings, which may allow them to reconfigure payment processors, authentication providers, and cloud storage credentials.

Such control could lead to unauthorized access, financial fraud, data breaches, and disruption of services, severely compromising the security and integrity of the platform.


Can you explain this vulnerability to me?

This vulnerability affects WWBN AVideo, an open source video platform, specifically versions 26.0 and prior. The issue lies in the admin plugin configuration endpoint (admin/save.json.php), which does not validate CSRF tokens. There is no verification using isGlobalTokenValid() or verifyToken() before processing requests. Because the application uses a SameSite=None cookie policy, an attacker can craft cross-origin POST requests from a malicious website to overwrite plugin settings in an administrator's session.

Additionally, the plugins table is excluded from standard table-level access controls, allowing attackers to bypass security checks. This enables an attacker to take over platform functionality by changing critical settings such as payment processors, authentication providers, and cloud storage credentials.

At the time of publication, no public patches are available to fix this vulnerability.


What immediate steps should I take to mitigate this vulnerability?

Since there are no publicly available patches at the time of publication, immediate mitigation steps should focus on limiting exposure and risk.

  • Restrict access to the admin plugin configuration endpoint (admin/save.json.php) to trusted IP addresses or networks only.
  • Implement additional CSRF protections at the web server or application firewall level to block cross-origin POST requests targeting the vulnerable endpoint.
  • Monitor administrative sessions for unusual activity or unexpected changes in plugin configurations.
  • Consider temporarily disabling the admin plugin or the affected configuration endpoint if feasible until a patch is available.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an attacker to take over platform functionality by reconfiguring critical settings such as payment processors, authentication providers, and cloud storage credentials. This could lead to unauthorized access and manipulation of sensitive data.

Such unauthorized access and control could result in violations of data protection regulations like GDPR and HIPAA, which require strict controls over access to personal and sensitive information.

However, the provided information does not explicitly state the impact on compliance with these standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart