Description
WWBN AVideo is an open source video platform. In versions 26.0 and prior, the install/test.php diagnostic script has its CLI-only access guard disabled by commenting out the die() statement. The script remains accessible via HTTP after installation, exposing video viewer statistics including IP addresses, session IDs, and user agents to unauthenticated visitors.
Published: 2026-04-06
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

WWBN AVideo is an open‑source video platform. In versions 26.0 and earlier, the install/test.php diagnostic script had its CLI‑only access guard disabled because the die() statement was commented out. As a result, the script remains reachable through HTTP after the application has been installed. When accessed, the script outputs detailed video‑viewer statistics, including IP addresses, session IDs, and user‑agent strings. An unauthenticated visitor can obtain this data, leading to private information leakage and potential tracking or session‑replay attacks. The weakness aligns with CWE‑200, an information‑disclosure vulnerability.

Affected Systems

The vulnerability affects the AVideo video platform manufactured by WWBN. All installations running version 26.0 or earlier are potentially impacted. No specific subversions are listed, so any deployment of 26.0 or lower should be considered at risk.

Risk and Exploitability

CVSS v3 indicates a moderate risk with a score of 5.3. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a simple HTTP GET request to the script's URL, as the script is publicly accessible after installation. This exploitation requires only the knowledge of the script’s location; no authentication is needed. The disclosed information can assist attackers in identifying users or forging session‑related data, but it does not provide code execution or administrative privileges. Because the vulnerability is straightforward to exploit, administrators should address it promptly.

Generated by OpenCVE AI on April 7, 2026 at 02:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade AVideo to the latest release.
  • If upgrading is not possible yet, delete or move install/test.php from the web root.
  • Re‑enable the CLI guard by restoring the commented die() statement so the script can only be accessed via CLI.

Generated by OpenCVE AI on April 7, 2026 at 02:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hg8q-8wqr-35xx AVideo: Unauthenticated Information Disclosure via Disabled CLI Guard in install/test.php
History

Thu, 23 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Wwbn
Wwbn avideo
Vendors & Products Wwbn
Wwbn avideo

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description WWBN AVideo is an open source video platform. In versions 26.0 and prior, the install/test.php diagnostic script has its CLI-only access guard disabled by commenting out the die() statement. The script remains accessible via HTTP after installation, exposing video viewer statistics including IP addresses, session IDs, and user agents to unauthenticated visitors.
Title WWBN AVideo has Unauthenticated Information Disclosure via Disabled CLI Guard in install/test.php
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T13:28:55.133Z

Reserved: 2026-04-02T19:25:52.192Z

Link: CVE-2026-35449

cve-icon Vulnrichment

Updated: 2026-04-07T13:28:38.094Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T22:16:23.310

Modified: 2026-04-23T15:31:39.890

Link: CVE-2026-35449

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:36:37Z

Weaknesses