CVE-2026-35180
CSRF in WWBN AVideo Allows Logo Overwrite via Cross-Origin POST
Publication date: 2026-04-06
Last updated on: 2026-04-15
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wwbn | avideo | to 26.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-35180 is a Cross-Site Request Forgery (CSRF) vulnerability in the WWBN AVideo platform, affecting versions 26.0 and prior. The vulnerability exists in the site customization endpoint admin/customize_settings_nativeUpdate.json.php, which allows uploading a logo image.
The endpoint processes logo uploads by decoding base64-encoded image data from a POST parameter and writes the image file to disk before performing any domain-based security checks. Because there is no CSRF token validation and the platform uses a SameSite=None cookie policy, an attacker can craft a malicious cross-origin POST request that uses the admin's authenticated session cookies to overwrite the platform's logo with attacker-controlled content.
This means that if an authenticated admin visits a malicious webpage, the attacker can replace the site's logo with a fraudulent image, potentially enabling defacement or phishing attacks.
How can this vulnerability impact me? :
This vulnerability allows an attacker to overwrite the platform's logo with attacker-controlled images without authorization.
- Unauthorized replacement of the platform logo.
- Potential phishing vector by displaying misleading or fraudulent visuals to users.
- The overwrite is irreversible without manual intervention by an administrator.
Although the integrity impact is low, this can damage trust and user experience by showing misleading content.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for unauthorized POST requests to the endpoint admin/customize_settings_nativeUpdate.json.php that include base64-encoded image data in the parameter logoImgBase64.
Since the vulnerability involves Cross-Site Request Forgery (CSRF) without token validation, detection can focus on identifying unexpected or cross-origin POST requests to this endpoint.
Suggested commands include inspecting web server logs for POST requests to the vulnerable endpoint and analyzing the request payloads for base64-encoded image data.
- Use grep or similar tools to find POST requests to admin/customize_settings_nativeUpdate.json.php in access logs, e.g., `grep "POST /admin/customize_settings_nativeUpdate.json.php" /var/log/apache2/access.log`
- Use tools like tcpdump or Wireshark to capture and analyze HTTP POST traffic targeting the vulnerable endpoint.
- Check for unexpected changes to the platform logo file on disk, which may indicate exploitation.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include implementing CSRF token validation at the start of the admin/customize_settings_nativeUpdate.json.php endpoint before processing any POST data or writing files.
Specifically, add a check such as `if (!isGlobalTokenValid()) { die('{"error":"Invalid CSRF token"}'); }` to prevent unauthorized requests.
Additionally, restrict or monitor cross-origin POST requests and consider temporarily disabling the vulnerable endpoint if possible until a patch is available.
Administrators should also verify and restore the platform logo if it has been overwritten by an attacker.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthorized modification of the platform's logo through a CSRF attack, which can lead to phishing attacks by displaying misleading images. While the confidentiality of data is not impacted, the integrity of the platform's visual content is compromised.
This integrity impact, although low, could potentially affect compliance with standards and regulations that require maintaining the integrity and authenticity of user-facing content and preventing phishing or social engineering attacks, such as GDPR or HIPAA.
However, since there is no direct impact on confidentiality or availability of personal or sensitive data, the effect on compliance with these regulations is limited but still relevant in terms of preventing phishing and maintaining trust.