Description
WWBN AVideo is an open source video platform. In versions 26.0 and prior, the plugin/API/check.ffmpeg.json.php endpoint probes the FFmpeg remote server configuration and returns connectivity status without any authentication. All sibling FFmpeg management endpoints (kill.ffmpeg.json.php, list.ffmpeg.json.php, ffmpeg.php) require User::isAdmin().
Published: 2026-04-06
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

The vulnerability exists in a diagnostic API endpoint that reports the status of a remote FFmpeg server without requiring any authentication. As a result, anyone able to reach the endpoint can observe whether the platform is able to communicate with its FFmpeg instance, revealing details about the remote server configuration. This lack of authentication is a classic example of CWE‑306, missing authentication on an operation that could divulge sensitive information. The impact is purely at the level of confidentiality, enabling an attacker to gather reconnaissance data about the FFmpeg setup.

Affected Systems

WWBN AVideo, the open‑source video platform, is affected in all releases from the beginning up to and including v26.0. The vulnerability resides solely in the check.ffmpeg.json.php API file; other FFmpeg‑management scripts such as kill.ffmpeg.json.php, list.ffmpeg.json.php, and ffmpeg.php correctly enforce an administrative check and remain secure.

Risk and Exploitability

The CVSS v3 score of 5.3 indicates a moderate risk. With an EPSS score below 1 % and no listing in the CISA KEV catalog, the probability of exploitation in the wild appears low. The likely attack vector is a direct HTTP request to the vulnerable endpoint, which can be performed from any network that can reach the AVideo instance. Because the information disclosed is limited to connectivity status, the threat is primarily to confidentiality and may aid in further reconnaissance rather than enabling a full system compromise.

Generated by OpenCVE AI on April 14, 2026 at 16:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest AVideo release that addresses the missing authentication on the check.ffmpeg.json.php endpoint.
  • If upgrading is not an option, modify the check.ffmpeg.json.php script to require User::isAdmin() or otherwise authenticate the requester.
  • Confirm that the remaining FFmpeg management endpoints continue to enforce the appropriate administrative checks.
  • Monitor the web server access logs for frequent unauthenticated accesses to check.ffmpeg.json.php and investigate any suspicious activity.

Generated by OpenCVE AI on April 14, 2026 at 16:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2vg4-rrx4-qcpq AVideo: Unauthenticated FFmpeg Remote Server Status Disclosure via check.ffmpeg.json.php
History

Tue, 14 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Wwbn
Wwbn avideo
Vendors & Products Wwbn
Wwbn avideo

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description WWBN AVideo is an open source video platform. In versions 26.0 and prior, the plugin/API/check.ffmpeg.json.php endpoint probes the FFmpeg remote server configuration and returns connectivity status without any authentication. All sibling FFmpeg management endpoints (kill.ffmpeg.json.php, list.ffmpeg.json.php, ffmpeg.php) require User::isAdmin().
Title WWBN AVideo has Unauthenticated FFmpeg Remote Server Status Disclosure via check.ffmpeg.json.php
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T16:21:46.027Z

Reserved: 2026-04-02T19:25:52.192Z

Link: CVE-2026-35450

cve-icon Vulnrichment

Updated: 2026-04-07T16:21:40.314Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T22:16:23.463

Modified: 2026-04-14T15:37:29.017

Link: CVE-2026-35450

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:30:09Z

Weaknesses