Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `get_api_video_file` and `get_api_video` API endpoints in AVideo return full video playback sources (direct MP4 URLs, HLS manifests) for password-protected videos without verifying the video password. While the normal web playback flow enforces password checks via the `CustomizeUser::getModeYouTube()` hook, this enforcement is completely absent from the API code path. An unauthenticated attacker can retrieve direct playback URLs for any password-protected video by calling the API directly. Commit be344206f2f461c034ad2f1c5d8212dd8a52b8c7 fixes the issue.
Published: 2026-03-27
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: Unrestricted access to password-protected video URLs
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an unauthenticated caller of AVideo's API endpoints to obtain direct video playback URLs for content that is otherwise protected by a password. Because the API path does not perform the same password check that the normal web player uses, the attacker can retrieve the full MP4 and HLS stream locations and play them without any credential. This results in unauthorized disclosure of the protected video media and undermines the platform's privacy controls. The weakness is a missing authorization check (CWE-862).

Affected Systems

AVideo, the open source video platform maintained by WWBN, is affected in all released versions up to and including 26.0. Users running any of these versions and relying on the protected-video feature should verify which version they are using. Later revisions after the fix are not impacted.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity risk, and the absence of network restriction means any external actor can call the API without authentication. Because the vulnerability does not rely on a complex condition or privilege escalation, it is relatively easy to exploit, subject to the availability of the video ID, which is generally public. Although the vulnerability is not presently listed in CISA's KEV catalog and EPSS data are not available, the straightforward nature of the attack and the potential for privacy loss make immediate remediation advisable.

Generated by OpenCVE AI on March 27, 2026 at 19:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade AVideo to a version newer than 26.0 that includes the authentication check for the API endpoints.
  • If an upgrade is not feasible immediately, restrict or guard the get_api_video and get_api_video_file endpoints so that only authenticated requests can retrieve playback URLs.
  • Test the API after applying changes to confirm that password-protected videos no longer return playback URLs to unauthenticated callers.

Generated by OpenCVE AI on March 27, 2026 at 19:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Description WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `get_api_video_file` and `get_api_video` API endpoints in AVideo return full video playback sources (direct MP4 URLs, HLS manifests) for password-protected videos without verifying the video password. While the normal web playback flow enforces password checks via the `CustomizeUser::getModeYouTube()` hook, this enforcement is completely absent from the API code path. An unauthenticated attacker can retrieve direct playback URLs for any password-protected video by calling the API directly. Commit be344206f2f461c034ad2f1c5d8212dd8a52b8c7 fixes the issue.
Title AVIdeo has Video Password Protection Bypass via API Endpoints Returning Full Playback Sources Without Password Verification
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T18:13:23.534Z

Reserved: 2026-03-27T13:43:14.369Z

Link: CVE-2026-34369

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T19:16:42.737

Modified: 2026-03-27T19:16:42.737

Link: CVE-2026-34369

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T20:27:50Z

Weaknesses