PT-2026-37301 · Wwbn · Avideo

Tronglinh23

·

Published

2026-05-05

·

Updated

2026-05-12

·

CVE-2026-43885

CVSS v4.0

8.7

High

VectorAV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Name of the Vulnerable Software and Affected Versions WWBN AVideo versions prior to 29.1
Description An unauthenticated user can access the public endpoint "objects/plugins.json.php" to read the APISecret from the plugin object data. This secret can then be used to authenticate requests to the protected API endpoint "plugin/API/get.json.php" by providing it via the APISecret parameter, allowing unauthorized access to protected data such as the users list via the APIName parameter.
Recommendations Update to the version containing commit 1c36f229d0a103528fb9f64d0a1cc0e1e8f5999b. Require administrator authentication for the full plugin inventory and configuration endpoint.

Exploit

Fix

Information Disclosure

Missing Authorization

Weakness Enumeration

Related Identifiers

CVE-2026-43885
GHSA-XR49-F4RH-QCJF

Affected Products

Avideo