WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AVideo endpoint objects/pluginSwitch.json.php allows administrators to enable or disable any installed plugin. The endpoint checks for an active admin session but does not validate a CSRF token. Additionally, the plugins database table is explicitly listed in ignoreTableSecurityCheck(), which means the ORM-level Referer/Origin domain validation in ObjectYPT::save() is also bypassed. Combined with SameSite=None on session cookies, an attacker can disable critical security plugins (such as LoginControl for 2FA, subscription enforcement, or access control plugins) by luring an admin to a malicious page. At time of publication, there are no publicly available patches.
References
| Link | Resource |
|---|---|
| https://github.com/WWBN/AVideo/security/advisories/GHSA-hqxf-mhfw-rc44 | Exploit Vendor Advisory |
Configurations
History
01 Apr 2026, 20:30
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Wwbn
Wwbn avideo |
|
| References | () https://github.com/WWBN/AVideo/security/advisories/GHSA-hqxf-mhfw-rc44 - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:* |
31 Mar 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-31 21:16
Updated : 2026-04-01 20:30
NVD link : CVE-2026-34613
Mitre link : CVE-2026-34613
CVE.ORG link : CVE-2026-34613
JSON object : View
Products Affected
wwbn
- avideo
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
