CVE-2026-33690

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `getRealIpAddr()` function in `objects/functions.php` trusts user-controlled HTTP headers to determine the client's IP address. An attacker can spoof their IP address by sending forged headers, bypassing any IP-based access controls or audit logging. Commit 1a1df6a9377e5cc67d1d0ac8ef571f7abbffbc6c contains a patch.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

History

25 Mar 2026, 15:06

Type Values Removed Values Added
Summary
  • (es) WWBN AVideo es una plataforma de vídeo de código abierto. En versiones hasta la 26.0 inclusive, la función 'getRealIpAddr()' en 'objects/functions.php' confía en los encabezados HTTP controlados por el usuario para determinar la dirección IP del cliente. Un atacante puede falsificar su dirección IP enviando encabezados falsificados, eludiendo cualquier control de acceso basado en IP o registro de auditoría. El commit 1a1df6a9377e5cc67d1d0ac8ef571f7abbffbc6c contiene un parche.
References () https://github.com/WWBN/AVideo/commit/1a1df6a9377e5cc67d1d0ac8ef571f7abbffbc6c - () https://github.com/WWBN/AVideo/commit/1a1df6a9377e5cc67d1d0ac8ef571f7abbffbc6c - Patch
References () https://github.com/WWBN/AVideo/security/advisories/GHSA-8p2x-5cpm-qrqw - () https://github.com/WWBN/AVideo/security/advisories/GHSA-8p2x-5cpm-qrqw - Exploit, Vendor Advisory
CPE cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*
First Time Wwbn
Wwbn avideo

23 Mar 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-23 19:16

Updated : 2026-03-25 15:06


NVD link : CVE-2026-33690

Mitre link : CVE-2026-33690

CVE.ORG link : CVE-2026-33690


JSON object : View

Products Affected

wwbn

  • avideo
CWE
CWE-348

Use of Less Trusted Source