Description
WWBN AVideo is an open source video platform. Prior to version 26.0, the HLS streaming endpoint (`view/hls.php`) is vulnerable to a path traversal attack that allows an unauthenticated attacker to stream any private or paid video on the platform. The `videoDirectory` GET parameter is used in two divergent code paths — one for authorization (which truncates at the first `/` segment) and one for file access (which preserves `..` traversal sequences) — creating a split-oracle condition where authorization is checked against one video while content is served from another. Version 26.0 contains a fix for the issue.
Published: 2026-03-22
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Media Access
Action: Patch Now
AI Analysis

Impact

WWBN AVideo’s HLS streaming endpoint, located at view/hls.php, contains a path traversal flaw that permits an unauthenticated attacker to bypass authorization checks and stream private or paid video content. The vulnerability arises from inconsistent handling of the videoDirectory GET parameter: one code path truncates the value at the first slash for authorization, while another preserves '..' sequences for file access, creating a split-oracle condition. Consequently, a crafted request can satisfy the authorization check for one video identifier while actually serving the media of another protected video, effectively leaking confidential footage.

Affected Systems

All installations of WWBN AVideo released before version 26.0 are affected. The default vendor/product name used by the CNA is WWBN:AVideo. There is no further sub‑version restriction listed, so any legacy deployment older than 26.0 is potentially vulnerable.

Risk and Exploitability

The CVSS score of 7.5 signifies a high severity level for confidentiality. The EPSS score is below 1%, indicating that exploitation likelihood is currently low, and the vulnerability is not yet listed in CISA’s KEV catalog. However, the flaw is remotely exploitable from any unauthenticated user capable of issuing HTTP requests to the view/hls.php endpoint with a specially crafted videoDirectory value. The attack vector is likely a direct web request; no special privileges, network access, or additional software is required.

Generated by OpenCVE AI on March 23, 2026 at 17:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade AVideo to version 26.0 or later to eliminate the path traversal flaw.

Generated by OpenCVE AI on March 23, 2026 at 17:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-pw4v-x838-w5pg AVideo has an Authorization Bypass via Path Traversal in HLS Endpoint Allows Streaming Private/Paid Videos
History

Mon, 23 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Wwbn
Wwbn avideo
Vendors & Products Wwbn
Wwbn avideo

Sun, 22 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description WWBN AVideo is an open source video platform. Prior to version 26.0, the HLS streaming endpoint (`view/hls.php`) is vulnerable to a path traversal attack that allows an unauthenticated attacker to stream any private or paid video on the platform. The `videoDirectory` GET parameter is used in two divergent code paths — one for authorization (which truncates at the first `/` segment) and one for file access (which preserves `..` traversal sequences) — creating a split-oracle condition where authorization is checked against one video while content is served from another. Version 26.0 contains a fix for the issue.
Title AVideo has Authorization Bypass via Path Traversal in HLS Endpoint Allows Streaming Private/Paid Videos
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-23T16:04:06.517Z

Reserved: 2026-03-18T18:55:47.426Z

Link: CVE-2026-33292

cve-icon Vulnrichment

Updated: 2026-03-23T16:03:54.354Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-22T17:17:08.753

Modified: 2026-03-23T16:18:24.447

Link: CVE-2026-33292

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:50:33Z

Weaknesses