Description
WWBN AVideo is an open source video platform. In versions 26.0 and prior, the plugin/YPTWallet/view/users.json.php endpoint returns all platform users with their personal information and wallet balances to any authenticated user. The endpoint checks User::isLogged() but does not check User::isAdmin(), so any registered user can dump the full user database. At time of publication, there are no publicly available patches.
Published: 2026-03-31
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Mass disclosure of user PII and wallet balances
Action: Assess Impact
AI Analysis

Impact

The flaw in the YPTWallet users.json.php endpoint allows any authenticated user to retrieve the complete list of platform users along with their personal information and wallet balances. Because the code only checks for generic authentication and never confirms administrative privileges, attackers can harvest sensitive data by simply logging into the system. The vulnerability is a classic example of missing authority checks, categorized as CWE-862, resulting in privacy compromise for all registered users.

Affected Systems

The issue affects the WWBN AVideo open‑source video platform, specifically versions 26.0 and earlier. The problematic endpoint resides in the YPTWallet plugin. Anyone running an affected instance, regardless of the underlying operating system, is potentially vulnerable if the plugin is installed.

Risk and Exploitability

The CVSS base score of 6.5 signals a medium‑severity risk. EPSS indicates less than 1% chance of exploitation in the wild, and the flaw is not listed in the CISA KEV catalog. Exploitation requires only that the user is authenticated; an attacker who creates a free account or compromises another user’s credentials can trigger the data dump. No publicly available patch exists at publication, so the vulnerability remains exploitable until an update is released.

Generated by OpenCVE AI on April 2, 2026 at 03:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an official patch or update to AVideo when it becomes available.
  • If a patch is not yet released, disable or remove the YPTWallet plugin to eliminate the vulnerable endpoint.
  • Alternatively, restrict access to the /YPTWallet/view/users.json.php endpoint so that only administrative users can invoke it.
  • Verify that no other authenticated users have unnecessary access privileges in the platform.
  • Regularly check the WWBN project page for new security releases.

Generated by OpenCVE AI on April 2, 2026 at 03:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-77jp-mgcw-rfmr AVideo vulnerable to Mass User PII Disclosure via Missing Authorization in YPTWallet users.json.php
History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Wwbn
Wwbn avideo
CPEs cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*
Vendors & Products Wwbn
Wwbn avideo
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description WWBN AVideo is an open source video platform. In versions 26.0 and prior, the plugin/YPTWallet/view/users.json.php endpoint returns all platform users with their personal information and wallet balances to any authenticated user. The endpoint checks User::isLogged() but does not check User::isAdmin(), so any registered user can dump the full user database. At time of publication, there are no publicly available patches.
Title AVideo: Mass User PII Disclosure via Missing Authorization in YPTWallet users.json.php
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-01T18:35:40.270Z

Reserved: 2026-03-27T13:45:29.619Z

Link: CVE-2026-34395

cve-icon Vulnrichment

Updated: 2026-04-01T18:35:36.563Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T21:16:30.817

Modified: 2026-04-01T20:35:18.280

Link: CVE-2026-34395

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:10:45Z

Weaknesses