CVE-2026-33688Observable Response Discrepancy in Avideo

Severity
5.3MEDIUMNVD
EPSS
0.1%
top 82.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 23
Latest updateMar 25

Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the password recovery endpoint at `objects/userRecoverPass.php` performs user existence and account status checks before validating the captcha. This allows an unauthenticated attacker to enumerate valid usernames and determine whether accounts are active, inactive, or banned — at scale and without solving any captcha — by observing three distinct JSON error responses. Commit e42f54123b460fd1b2ee01f2ce3d4a386e88d

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages2 packages

NVDwwbn/avideo26.0
Packagistwwbn/avideo26.0

Patches

🔴Vulnerability Details

2
GHSA
AVideo has Pre-Captcha User Enumeration and Account Status Disclosure in Password Recovery Endpoint2026-03-25
OSV
AVideo has Pre-Captcha User Enumeration and Account Status Disclosure in Password Recovery Endpoint2026-03-25

🕵️Threat Intelligence

1
Wiz
CVE-2026-33688 Impact, Exploitability, and Mitigation Steps | Wiz