Description
WWBN AVideo is an open source video platform. Prior to version 26.0, the `setPassword.json.php` endpoint in the CustomizeUser plugin allows administrators to set a channel password for any user. Due to a logic error in how the submitted password value is processed, any password containing non-numeric characters is silently coerced to the integer zero before being stored. This means that regardless of the intended password, the stored channel password becomes 0, which any visitor can trivially guess to bypass channel-level access control. Version 26.0 contains a patch for the issue.
Published: 2026-03-23
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Channel Access
Action: Immediate Patch
AI Analysis

Impact

The identified flaw is an Insecure Direct Object Reference in the setPassword.json.php endpoint of the CustomizeUser plugin. Administrative users are able to set the channel password for any user account. Due to a logic error, any password that contains non‑numeric characters is silently converted to the integer zero before storage, so the channel password always becomes 0. An attacker who has administrative privileges can therefore reset a channel’s password to a predictable value, and any visitor can simply enter 0 to gain access to protected channel content. This ticket is classified as CWE‑639, representing an authorization bypass through user‑controlled input. Consequently, the vulnerability permits unauthorized users to view channel‑protected media that should only be visible to the channel owner or authorized personnel.

Affected Systems

The affected product is the WWBN AVideo open‑source video platform. All releases before version 26.0 are susceptible, as the setPassword.json.php endpoint ships with the CustomizeUser plugin in those versions. No specific sub‑modules or third‑party components are highlighted outside this platform.

Risk and Exploitability

The CVSS score of 5.1 places the issue in the moderate severity band. The EPSS score is not provided, and the vulnerability is not listed in the CISA KEV catalog, suggesting a lower public exploitation prevalence. However, the attack requires an authenticated administrator to invoke the vulnerable endpoint; once that occurs, the resulting channel password reset can be exploited by any web visitor, leading to unintended disclosure of channel content. No public exploitation evidence exists, but the logical flaw can be abused with minimal effort by a compromised administrator or through lateral movement within a privileged user’s session.

Generated by OpenCVE AI on March 23, 2026 at 17:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WWBN AVideo to version 26.0 or newer.
  • If an upgrade is not immediately possible, restrict administrative privileges to trusted personnel and audit account activity.
  • As a temporary measure, block or disable access to the setPassword.json.php endpoint until a patch is applied.

Generated by OpenCVE AI on March 23, 2026 at 17:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6547-8hrg-c55m AVideo: IDOR - Any Admin Can Set Another User's Channel Password via setPassword.json.php
History

Mon, 23 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Wwbn
Wwbn avideo
CPEs cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*
Vendors & Products Wwbn
Wwbn avideo
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Mon, 23 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
Description WWBN AVideo is an open source video platform. Prior to version 26.0, the `setPassword.json.php` endpoint in the CustomizeUser plugin allows administrators to set a channel password for any user. Due to a logic error in how the submitted password value is processed, any password containing non-numeric characters is silently coerced to the integer zero before being stored. This means that regardless of the intended password, the stored channel password becomes 0, which any visitor can trivially guess to bypass channel-level access control. Version 26.0 contains a patch for the issue.
Title AVideo has an IDOR - Any Admin Can Set Another User's Channel Password via setPassword.json.php
Weaknesses CWE-639
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-23T15:58:43.619Z

Reserved: 2026-03-18T18:55:47.427Z

Link: CVE-2026-33297

cve-icon Vulnrichment

Updated: 2026-03-23T15:58:39.928Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-23T14:16:33.273

Modified: 2026-03-23T15:58:42.010

Link: CVE-2026-33297

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:49:02Z

Weaknesses