| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xxpw-32hf-q8v9 | AVideo: Unauthenticated PHP session store exposed to host network via published memcached port |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 06 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wwbn
Wwbn avideo |
|
| Vendors & Products |
Wwbn
Wwbn avideo |
Fri, 06 Mar 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WWBN AVideo is an open source video platform. Prior to version 24.0, the official docker-compose.yml publishes the memcached service on host port 11211 (0.0.0.0:11211) with no authentication, while the Dockerfile configures PHP to store all user sessions in that memcached instance. An attacker who can reach port 11211 can read, modify, or flush session data — enabling session hijacking, admin impersonation, and mass session destruction without any application-level authentication. This issue has been patched in version 24.0. | |
| Title | WWBN AVideo: Unauthenticated PHP session store exposed to host network via published memcached port | |
| Weaknesses | CWE-287 CWE-668 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-06T16:10:12.415Z
Reserved: 2026-03-03T21:54:06.707Z
Link: CVE-2026-29093
Updated: 2026-03-06T15:58:31.430Z
Status : Received
Published: 2026-03-06T04:16:08.940
Modified: 2026-03-06T04:16:08.940
Link: CVE-2026-29093
No data.
OpenCVE Enrichment
Updated: 2026-03-06T14:56:09Z
Github GHSA