CVE-2026-34737

WWBN AVideo is an open source video platform. In versions 26.0 and prior, the StripeYPT plugin includes a test.php debug endpoint that is accessible to any logged-in user, not just administrators. This endpoint processes Stripe webhook-style payloads and triggers subscription operations, including cancellation. Due to a bug in the retrieveSubscriptions() method that cancels subscriptions instead of merely retrieving them, any authenticated user can cancel arbitrary Stripe subscriptions by providing a subscription ID. At time of publication, there are no publicly available patches.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

History

01 Apr 2026, 18:45

Type Values Removed Values Added
References () https://github.com/WWBN/AVideo/security/advisories/GHSA-38rh-4v39-vfxv - () https://github.com/WWBN/AVideo/security/advisories/GHSA-38rh-4v39-vfxv - Exploit, Vendor Advisory
CPE cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*
First Time Wwbn
Wwbn avideo

31 Mar 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 21:16

Updated : 2026-04-01 18:45


NVD link : CVE-2026-34737

Mitre link : CVE-2026-34737

CVE.ORG link : CVE-2026-34737


JSON object : View

Products Affected

wwbn

  • avideo
CWE
CWE-862

Missing Authorization