Description
WWBN AVideo is an open source video platform. In versions 26.0 and prior, the site customization endpoint at admin/customize_settings_nativeUpdate.json.php lacks CSRF token validation and writes uploaded logo files to disk before the ORM's domain-based security check executes. Combined with SameSite=None cookie policy, a cross-origin POST can overwrite the platform's logo with attacker-controlled content.
Published: 2026-04-06
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Defacement via logo overwrite
Action: Patch
AI Analysis

Impact

The vulnerability appears in the site customization endpoint of versions 26.0 and earlier of the WWBN AVideo video platform. The endpoint lacks CSRF token validation and writes uploaded logo files to disk before the ORM’s domain‑based security check runs. Because the platform uses a SameSite=None cookie policy, a cross‑origin POST request can be constructed to trigger the logo upload. The resulting defect allows an attacker to replace the platform’s logo with arbitrary content, effectively defacing the website’s appearance. This weakness corresponds to CWE-352, the Cross‑Site Request Forgery flaw.

Affected Systems

The affected product is the WWBN AVideo platform. Versions 26.0 and earlier contain the unchecked CSRF logic and the insecure file write routine. No patch version is listed in the advisory, but upgrading to a build newer than 26.0 removes the flaw.

Risk and Exploitability

The CVSS score of 4.3 indicates a low severity from a pure technical standpoint, but the potential for brand defacement and the ease of exploitation via a cross‑origin POST make it a security nuisance that should be addressed promptly. EPSS data is not available, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is a remote user crafting a cross‑origin HTTP request that exploits the missing CSRF token and the lax SameSite cookie setting. No additional prerequisites beyond normal web interaction are required, meaning the risk is that any visitor with access to the 'admin/customize_settings_nativeUpdate.json.php' endpoint could trigger the logo overwrite. The absence of a requirement for elevated privileges further lowers the barrier to exploitation.

Generated by OpenCVE AI on April 7, 2026 at 01:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a version of WWBN AVideo newer than 26.0 that includes CSRF validation and corrected file handling.
  • Implement CSRF token checks on the '/admin/customize_settings_nativeUpdate.json.php' endpoint if an upgrade is not yet possible.
  • Adjust the platform’s session cookie attributes to use SameSite=Lax or SameSite=Strict, reducing the risk of cross‑origin POSTs.
  • Audit and monitor the logo file location for unauthorized changes to detect potential tampering.
  • Apply any vendor‑provided security patches as they become available to eliminate the underlying flaw.

Generated by OpenCVE AI on April 7, 2026 at 01:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Wwbn
Wwbn avideo
Vendors & Products Wwbn
Wwbn avideo

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description WWBN AVideo is an open source video platform. In versions 26.0 and prior, the site customization endpoint at admin/customize_settings_nativeUpdate.json.php lacks CSRF token validation and writes uploaded logo files to disk before the ORM's domain-based security check executes. Combined with SameSite=None cookie policy, a cross-origin POST can overwrite the platform's logo with attacker-controlled content.
Title WWBN AVideo affected by CSRF on Site Customization Endpoint Enables Logo Overwrite via Base64 File Write
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T14:44:34.133Z

Reserved: 2026-04-01T17:26:21.133Z

Link: CVE-2026-35180

cve-icon Vulnrichment

Updated: 2026-04-07T14:44:30.328Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-06T20:16:26.237

Modified: 2026-04-07T13:20:11.643

Link: CVE-2026-35180

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:37:35Z

Weaknesses