Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the AI plugin's `save.json.php` endpoint loads AI response objects using an attacker-controlled `$_REQUEST['id']` parameter without validating that the AI response belongs to the specified video. An authenticated user with AI permissions can reference any AI response ID — including those generated for other users' private videos — and apply the stolen AI-generated content (titles, descriptions, keywords, summaries, or full transcriptions) to their own video, effectively exfiltrating the information. Commit aa2c46a806960a0006105df47765913394eec142 contains a patch.
Published: 2026-03-27
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Data Exfiltration
Action: Apply Patch
AI Analysis

Impact

The vulnerability is an IDOR in the AI plugin’s save.json.php endpoint that permits an authenticated user with AI permissions to load AI response objects for any specified video ID without validating ownership. This flaw allows the user to read and apply titles, descriptions, keywords, summaries, or full transcriptions that belong to other users’ private videos, effectively exfiltrating sensitive metadata generated from the original content.

Affected Systems

WWBN AVideo, an open‑source video platform, versions up to and including 26.0 are affected. The issue resides within the AI plugin and its save.json.php endpoint.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity, while the EPSS score of less than 1% shows a very low probability of exploitation. The vulnerability is not listed in the CISA known‑exploited vulnerability catalog. Exploitation requires the attacker to be an authenticated user with AI permissions; no unauthenticated or privilege escalation path is documented. The attack vector is limited to legitimate user interactions, making internal monitoring and permission control critical for risk mitigation.

Generated by OpenCVE AI on March 31, 2026 at 20:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update AVideo to a version that includes commit aa2c46a806960a0006105df47765913394eec142.
  • Restrict AI plugin access to users who truly need the AI features.
  • Monitor calls to save.json.php for unusual or repeated requests that target other users’ video IDs.
  • If the AI plugin is not essential, consider disabling it to eliminate the exposure.

Generated by OpenCVE AI on March 31, 2026 at 20:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-g39v-qrj6-jxrh AVideo: IDOR in AI Plugin Allows Stealing Other Users' AI-Generated Metadata and Transcriptions
History

Tue, 31 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Wwbn
Wwbn avideo
Vendors & Products Wwbn
Wwbn avideo

Fri, 27 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Description WWBN AVideo is an open source video platform. In versions up to and including 26.0, the AI plugin's `save.json.php` endpoint loads AI response objects using an attacker-controlled `$_REQUEST['id']` parameter without validating that the AI response belongs to the specified video. An authenticated user with AI permissions can reference any AI response ID — including those generated for other users' private videos — and apply the stolen AI-generated content (titles, descriptions, keywords, summaries, or full transcriptions) to their own video, effectively exfiltrating the information. Commit aa2c46a806960a0006105df47765913394eec142 contains a patch.
Title AVideo: IDOR in AI Plugin Allows Stealing Other Users' AI-Generated Metadata and Transcriptions
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T19:58:05.730Z

Reserved: 2026-03-23T18:30:14.126Z

Link: CVE-2026-33764

cve-icon Vulnrichment

Updated: 2026-03-27T18:52:21.088Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T15:16:58.587

Modified: 2026-03-31T18:45:13.003

Link: CVE-2026-33764

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T07:55:35Z

Weaknesses