CVE-2026-33038Missing Authentication for Critical Function in Avideo

Severity
8.1HIGHNVD
EPSS
0.1%
top 83.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
Latest updateMar 17
PublishedMar 20

Description

WWBN AVideo is an open source video platform. Versions 25.0 and below are vulnerable to unauthenticated application takeover through the install/checkConfiguration.php endpoint. install/checkConfiguration.php performs full application initialization: database setup, admin account creation, and configuration file write, all from an unauthenticated POST input. The only guard is checking whether videos/configuration.php already exists. On uninitialized deployments, any remote attacker can complete

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages2 packages

NVDwwbn/avideo< 26.0
Packagistwwbn/avideo25.0

Patches

🔴Vulnerability Details

2
GHSA
AVideo affected by unauthenticated application takeover via exposed web installer on uninitialized deployments2026-03-17
OSV
AVideo affected by unauthenticated application takeover via exposed web installer on uninitialized deployments2026-03-17

🕵️Threat Intelligence

2
Greynoiseio
NoiseLetter March 2026
Wiz
CVE-2026-33038 Impact, Exploitability, and Mitigation Steps | Wiz