Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, `isSSRFSafeURL()` validates URLs against private/reserved IP ranges before fetching, but `url_get_contents()` follows HTTP redirects without re-validating the redirect target. An attacker can bypass SSRF protection by redirecting from a public URL to an internal target. Commit 8b7e9dad359d5fac69e0cbbb370250e0b284bc12 contains a patch.
Published: 2026-03-27
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SSRF internal resource exposure
Action: Patch immediately
AI Analysis

Impact

This vulnerability exists in the image download endpoints of the WWBN AVideo platform. The server performs an SSRF check through the isSSRFSafeURL() function, which rejects URLs pointing to private or reserved IP ranges. However, the subsequent call to url_get_contents() blindly follows HTTP redirects without re‑applying the check. Consequently, an attacker can supply a public URL that redirects to an internal target, allowing the server to fetch internal resources. The flaw permits unauthorized access to internal services and data, constituting an internal resource disclosure via SSRF. It is classified as CWE‑918, which describes server‑side request forgery that bypasses network restrictions.

Affected Systems

All versions of WWBN AVideo up to and including 26.0 are affected. The patch commit 8b7e9dad359d5fac69e0cbbb370250e0b284bc12 removes the vulnerability. Users should upgrade to any version newer than 26.0 or apply this specific patch to ensure the SSRF guard is enforced properly.

Risk and Exploitability

The CVSS score of 5.3 denotes a medium severity, while the EPSS score of less than 1% suggests that exploitation is currently uncommon. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector involves a remote attacker crafting a specially crafted HTTP request to the image download endpoint that contains a redirect to an internal IP address. The exploit requires only network access to the web application and does not rely on privileged authentication, making it potentially reachable from the open internet.

Generated by OpenCVE AI on March 31, 2026 at 20:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch commit 8b7e9dad359d5fac69e0cbbb370250e0b284bc12 or upgrade to a version newer than 26.0
  • If an immediate update is not possible, configure the web application to reject or ignore HTTP redirects in image download endpoints
  • Add a secondary SSRF validation step that re‑checks the redirect target after following redirects
  • Monitor application logs and outbound network traffic for unexpected internal requests originating from the web server
  • Periodically verify that the SSRF protection remains active following any code changes

Generated by OpenCVE AI on March 31, 2026 at 20:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-f359-r3pv-2phf AVideo has SSRF Protection Bypass via HTTP Redirect in Image Download Endpoints
History

Tue, 31 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Wwbn
Wwbn avideo
Vendors & Products Wwbn
Wwbn avideo

Fri, 27 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Description WWBN AVideo is an open source video platform. In versions up to and including 26.0, `isSSRFSafeURL()` validates URLs against private/reserved IP ranges before fetching, but `url_get_contents()` follows HTTP redirects without re-validating the redirect target. An attacker can bypass SSRF protection by redirecting from a public URL to an internal target. Commit 8b7e9dad359d5fac69e0cbbb370250e0b284bc12 contains a patch.
Title AVideo has SSRF Protection Bypass via HTTP Redirect in Image Download Endpoints
Weaknesses CWE-918
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T14:45:06.774Z

Reserved: 2026-03-23T18:30:14.126Z

Link: CVE-2026-33766

cve-icon Vulnrichment

Updated: 2026-03-27T14:44:50.838Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T15:16:58.887

Modified: 2026-03-31T18:48:32.607

Link: CVE-2026-33766

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T07:55:34Z

Weaknesses