CVE-2026-33297Authorization Bypass Through User-Controlled Key in Avideo

Severity
5.1MEDIUMNVD
EPSS
0.0%
top 89.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
Latest updateMar 19
PublishedMar 23

Description

WWBN AVideo is an open source video platform. Prior to version 26.0, the `setPassword.json.php` endpoint in the CustomizeUser plugin allows administrators to set a channel password for any user. Due to a logic error in how the submitted password value is processed, any password containing non-numeric characters is silently coerced to the integer zero before being stored. This means that regardless of the intended password, the stored channel password becomes 0, which any visitor can trivially gu

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Packages2 packages

NVDwwbn/avideo< 26.0
Packagistwwbn/avideo25.0

Patches

🔴Vulnerability Details

2
GHSA
AVideo: IDOR - Any Admin Can Set Another User's Channel Password via setPassword.json.php2026-03-19
OSV
AVideo: IDOR - Any Admin Can Set Another User's Channel Password via setPassword.json.php2026-03-19

🕵️Threat Intelligence

1
Wiz
CVE-2026-33297 Impact, Exploitability, and Mitigation Steps | Wiz