CVE-2026-34613

WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AVideo endpoint objects/pluginSwitch.json.php allows administrators to enable or disable any installed plugin. The endpoint checks for an active admin session but does not validate a CSRF token. Additionally, the plugins database table is explicitly listed in ignoreTableSecurityCheck(), which means the ORM-level Referer/Origin domain validation in ObjectYPT::save() is also bypassed. Combined with SameSite=None on session cookies, an attacker can disable critical security plugins (such as LoginControl for 2FA, subscription enforcement, or access control plugins) by luring an admin to a malicious page. At time of publication, there are no publicly available patches.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

History

01 Apr 2026, 20:30

Type Values Removed Values Added
First Time Wwbn
Wwbn avideo
References () https://github.com/WWBN/AVideo/security/advisories/GHSA-hqxf-mhfw-rc44 - () https://github.com/WWBN/AVideo/security/advisories/GHSA-hqxf-mhfw-rc44 - Exploit, Vendor Advisory
CPE cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

31 Mar 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 21:16

Updated : 2026-04-01 20:30


NVD link : CVE-2026-34613

Mitre link : CVE-2026-34613

CVE.ORG link : CVE-2026-34613


JSON object : View

Products Affected

wwbn

  • avideo
CWE
CWE-352

Cross-Site Request Forgery (CSRF)