CVE-2026-29093Improper Authentication in Avideo

Severity
9.8CRITICALNVD
EPSS
0.1%
top 70.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
Latest updateMar 5
PublishedMar 6

Description

WWBN AVideo is an open source video platform. Prior to version 24.0, the official docker-compose.yml publishes the memcached service on host port 11211 (0.0.0.0:11211) with no authentication, while the Dockerfile configures PHP to store all user sessions in that memcached instance. An attacker who can reach port 11211 can read, modify, or flush session data — enabling session hijacking, admin impersonation, and mass session destruction without any application-level authentication. This issue has

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

NVDwwbn/avideo< 24.0
Packagistwwbn/avideo21.0

🔴Vulnerability Details

2
OSV
AVideo: Unauthenticated PHP session store exposed to host network via published memcached port2026-03-05
GHSA
AVideo: Unauthenticated PHP session store exposed to host network via published memcached port2026-03-05

🕵️Threat Intelligence

1
Wiz
CVE-2026-29093 Impact, Exploitability, and Mitigation Steps | Wiz