CVE-2026-33690Use of Less Trusted Source in Avideo

Severity
5.3MEDIUMNVD
EPSS
0.0%
top 95.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 23
Latest updateMar 25

Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `getRealIpAddr()` function in `objects/functions.php` trusts user-controlled HTTP headers to determine the client's IP address. An attacker can spoof their IP address by sending forged headers, bypassing any IP-based access controls or audit logging. Commit 1a1df6a9377e5cc67d1d0ac8ef571f7abbffbc6c contains a patch.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages3 packages

NVDwwbn/avideo26.0
Packagistwwbn/avideo26.0
CVEListV5wwbn/avideo<=26.0

Patches

🔴Vulnerability Details

2
GHSA
AVideo vulnerable to IP Address Spoofing via Untrusted HTTP Headers in getRealIpAddr()2026-03-25
OSV
AVideo vulnerable to IP Address Spoofing via Untrusted HTTP Headers in getRealIpAddr()2026-03-25

🕵️Threat Intelligence

1
Wiz
CVE-2026-33690 Impact, Exploitability, and Mitigation Steps | Wiz