Impact
The verifyTokenSocket() function in plugin/YPTSocket/functions.php has its token expiration check commented out, causing WebSocket tokens to never expire even though they are intended to be valid for only twelve hours. As a result, any token that is captured or legitimately obtained grants continuous, unlimited access to the WebSocket service. Admin‑level tokens expose real‑time data for all connected users, including IP addresses, browser details, and page locations, creating a valuable source for profiling or session hijacking. The vulnerability is not a direct code injection or remote execution flaw but enables prolonged unauthorized monitoring of user activity.
Affected Systems
WWBN AVideo, versions up to and including 26.0, suffers from this issue. The affected code resides in plugin/YPTSocket/functions.php within the AVideo codebase. No other versions or vendors are listed as affected.
Risk and Exploitability
The CVSS score of 5.4 indicates moderate severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not included in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector is that an attacker obtains a valid WebSocket token—either by capturing traffic or by compromising a user account—and then uses that token to maintain persistent access. Once the token is in the attacker’s possession, they can continuously monitor real‑time connection data for all users until the token is revoked, the user account is deleted, or the service is otherwise disabled. The flaw does not directly grant filesystem or elevated shell access and requires additional exploitation steps for broader compromise.
OpenCVE Enrichment
Github GHSA