CVE-2026-35181
CSRF Vulnerability in WWBN AVideo Player Skin Configuration
Publication date: 2026-04-06
Last updated on: 2026-04-14
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wwbn | avideo | to 26.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-35181 is a Cross-Site Request Forgery (CSRF) vulnerability in the WWBN AVideo platform versions 26.0 and prior. The vulnerability exists in the player skin configuration endpoint at admin/playerUpdate.json.php, which does not validate CSRF tokens when processing POST requests.
Normally, the platform's Object-Relational Mapping (ORM) layer enforces security checks based on the request's domain to prevent unauthorized cross-origin changes. However, the plugins table, which stores player skin configurations, is explicitly excluded from this security check using ignoreTableSecurityCheck(), removing this layer of defense.
Additionally, the platform uses SameSite=None cookies, meaning the authenticated admin's session cookie is sent with cross-origin POST requests. This combination allows an attacker to craft a malicious webpage that, when visited by an authenticated admin, can silently submit a POST request to change the video player skin configuration without the admin's consent.
How can this vulnerability impact me? :
This vulnerability allows an attacker to perform unauthorized, platform-wide modifications to the video player's appearance by changing the player skin configuration without the administrator's knowledge or consent.
Such unauthorized changes can disrupt the user experience, potentially causing confusion or mistrust among users. If invalid skin values are used, it may also disrupt video playback functionality.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for unauthorized POST requests to the endpoint admin/playerUpdate.json.php that modify the player skin configuration without proper CSRF token validation.
One way to detect potential exploitation attempts is to inspect web server logs or use network monitoring tools to identify cross-origin POST requests to this endpoint.
Since the vulnerability involves missing CSRF token validation, checking for POST requests lacking valid CSRF tokens or unexpected changes to the player skin configuration can indicate exploitation.
- Use command-line tools like curl to simulate POST requests and verify if CSRF tokens are required: curl -X POST -d "skin=minimalist" https://your-avideo-domain/admin/playerUpdate.json.php -v
- Check web server access logs for suspicious POST requests to admin/playerUpdate.json.php, for example: grep "POST /admin/playerUpdate.json.php" /var/log/apache2/access.log
- Use network monitoring tools (e.g., Wireshark or tcpdump) to capture and analyze HTTP POST traffic targeting the vulnerable endpoint.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to implement CSRF token validation in the admin/playerUpdate.json.php endpoint before processing any POST data.
Specifically, the application should verify the validity of a global CSRF token (e.g., by using a function like isGlobalTokenValid()) and reject any requests with invalid or missing tokens.
Until a patch is available, consider restricting access to the admin/playerUpdate.json.php endpoint to trusted IP addresses or disabling the endpoint if possible.
Additionally, review and adjust cookie settings to avoid using SameSite=None if it is not necessary, to reduce the risk of cross-origin requests including authentication cookies.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.