Description
WWBN AVideo is an open source video platform. In versions 26.0 and prior, the StripeYPT plugin includes a test.php debug endpoint that is accessible to any logged-in user, not just administrators. This endpoint processes Stripe webhook-style payloads and triggers subscription operations, including cancellation. Due to a bug in the retrieveSubscriptions() method that cancels subscriptions instead of merely retrieving them, any authenticated user can cancel arbitrary Stripe subscriptions by providing a subscription ID. At time of publication, there are no publicly available patches.
Published: 2026-03-31
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Subscription cancellation
Action: Restrict Access
AI Analysis

Impact

In open‑source video platforms running WWBN AVideo version 26.0 or earlier, a debug endpoint named test.php is exposed to every logged‑in user. The endpoint accepts Stripe‑style payloads and, due to a fault in the retrieveSubscriptions() routine, initiates cancellation of the subscription rather than only retrieving information. An attacker who authenticates to the site can therefore supply any Stripe subscription identifier and cause that subscription to terminate, resulting in irreversible financial loss and service disruption. The weakness is an access‑control flaw that allows authenticated users to execute privileged actions (CWE‑862).

Affected Systems

The vulnerability exists in the StripeYPT plugin bundled with WWBN AVideo releases 26.0 through the earliest available versions. Any installation that has not applied a later fix and still includes the test.php debug endpoint is exposed. The flaw is limited to environments where the plugin is active and the debug page is reachable, but the attack does not require elevated administrative privileges—only a logged‑in user account is sufficient.

Risk and Exploitability

The CVSS score of 6.5 indicates medium severity, and the EPSS score of less than 1% suggests a currently low probability of exploitation. However, because the vulnerability requires only authentication and no high‑privilege access, it provides a straightforward path to customer‑owned payment accounts for miscreants. The issue is not yet catalogued by CISA as a known exploited vulnerability, but that does not diminish the potential impact for users. Until an official patch is released, organizations should be vigilant for unexplained Stripe cancellations and consider restricting or disabling the affected endpoint.

Generated by OpenCVE AI on April 2, 2026 at 05:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Disable or restrict the test.php debug endpoint so that only administrators can access it.
  • Rename or remove the debug endpoint to eliminate the accidental cancellation trigger.
  • Upgrade WWBN AVideo to a version newer than 26.0 once the vendor releases a fix for the retrieveSubscriptions() bug.
  • Enforce strict role‑based access control to prevent ordinary users from calling any endpoint that interacts with Stripe functions.
  • Monitor Stripe account logs for unexpected cancellations and investigate anomalies promptly.

Generated by OpenCVE AI on April 2, 2026 at 05:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-38rh-4v39-vfxv AVideo: Arbitrary Stripe Subscription Cancellation via Debug Endpoint and retrieveSubscriptions() Bug
History

Fri, 03 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Wwbn
Wwbn avideo
CPEs cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*
Vendors & Products Wwbn
Wwbn avideo

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description WWBN AVideo is an open source video platform. In versions 26.0 and prior, the StripeYPT plugin includes a test.php debug endpoint that is accessible to any logged-in user, not just administrators. This endpoint processes Stripe webhook-style payloads and triggers subscription operations, including cancellation. Due to a bug in the retrieveSubscriptions() method that cancels subscriptions instead of merely retrieving them, any authenticated user can cancel arbitrary Stripe subscriptions by providing a subscription ID. At time of publication, there are no publicly available patches.
Title AVideo: Arbitrary Stripe Subscription Cancellation via Debug Endpoint and retrieveSubscriptions() Bug
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T16:34:47.338Z

Reserved: 2026-03-30T18:41:20.754Z

Link: CVE-2026-34737

cve-icon Vulnrichment

Updated: 2026-04-03T16:34:42.934Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T21:16:32.247

Modified: 2026-04-01T18:45:32.093

Link: CVE-2026-34737

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:10:37Z

Weaknesses