WWBN AVideo is an open source video platform. Versions 25.0 and below are vulnerable to unauthenticated application takeover through the install/checkConfiguration.php endpoint. install/checkConfiguration.php performs full application initialization: database setup, admin account creation, and configuration file write, all from an unauthenticated POST input. The only guard is checking whether videos/configuration.php already exists. On uninitialized deployments, any remote attacker can complete the installation with attacker-controlled credentials and an attacker-controlled database, gaining full administrative access. This issue has been fixed in version 26.0.
References
| Link | Resource |
|---|---|
| https://github.com/WWBN/AVideo/commit/b3fa7869dcb935c8ab5c001a88dc29d2f92cf8e1 | Patch |
| https://github.com/WWBN/AVideo/security/advisories/GHSA-2f9h-23f7-8gcx | Exploit Vendor Advisory |
| https://github.com/WWBN/AVideo/security/advisories/GHSA-2f9h-23f7-8gcx | Exploit Vendor Advisory |
Configurations
History
23 Mar 2026, 16:24
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/WWBN/AVideo/commit/b3fa7869dcb935c8ab5c001a88dc29d2f92cf8e1 - Patch | |
| References | () https://github.com/WWBN/AVideo/security/advisories/GHSA-2f9h-23f7-8gcx - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:* | |
| First Time |
Wwbn
Wwbn avideo |
20 Mar 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/WWBN/AVideo/security/advisories/GHSA-2f9h-23f7-8gcx - | |
| Summary |
|
20 Mar 2026, 06:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-20 06:16
Updated : 2026-03-23 16:24
NVD link : CVE-2026-33038
Mitre link : CVE-2026-33038
CVE.ORG link : CVE-2026-33038
JSON object : View
Products Affected
wwbn
- avideo
CWE
CWE-306
Missing Authentication for Critical Function
