CVE-2026-34740

WWBN AVideo is an open source video platform. In versions 26.0 and prior, the EPG (Electronic Program Guide) link feature in AVideo allows authenticated users with upload permissions to store arbitrary URLs that the server fetches on every EPG page visit. The URL is validated only with PHP's FILTER_VALIDATE_URL, which accepts internal network addresses. Although AVideo has a dedicated isSSRFSafeURL() function for preventing SSRF, it is not called in this code path. This results in a stored server-side request forgery vulnerability that can be used to scan internal networks, access cloud metadata services, and interact with internal services. At time of publication, there are no publicly available patches.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

History

01 Apr 2026, 18:43

Type Values Removed Values Added
CPE cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*
First Time Wwbn
Wwbn avideo
References () https://github.com/WWBN/AVideo/security/advisories/GHSA-x5vx-vrpf-r45f - () https://github.com/WWBN/AVideo/security/advisories/GHSA-x5vx-vrpf-r45f - Exploit, Vendor Advisory

31 Mar 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 21:16

Updated : 2026-04-01 18:43


NVD link : CVE-2026-34740

Mitre link : CVE-2026-34740

CVE.ORG link : CVE-2026-34740


JSON object : View

Products Affected

wwbn

  • avideo
CWE
CWE-918

Server-Side Request Forgery (SSRF)