Impact
In AVideo up to version 26.0 the CreatePlugin list.json.php template lacks an authentication guard, allowing any user to access 21 endpoints that return full plugin listings. These listings expose user PII, payment transaction logs, IP addresses, user agents, and internal system records, enabling attackers to obtain sensitive information without authorization.
Affected Systems
The flaw affects the WWBN AVideo open‑source video platform, specifically versions 26.0 and earlier. Any plugin generated by CreatePlugin inherits the missing guard, creating 21 unauthenticated data‑listing endpoints across the platform.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity while an EPSS score of less than 1 % suggests the risk of exploitation is currently low. The vulnerability is not in CISA’s KEV catalog. Attackers can exploit the flaw simply by sending HTTP requests to the unsecured endpoints, making the attack straightforward and requiring no credentials. With no public patch yet available, the risk persists until a vendor fix is released or mitigated by controls.
OpenCVE Enrichment
Github GHSA