CVE-2026-33759Authorization Bypass Through User-Controlled Key in Avideo

Severity
5.3MEDIUMNVD
EPSS
0.0%
top 85.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
Latest updateMar 26
PublishedMar 27

Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `objects/playlistsVideos.json.php` endpoint returns the full video contents of any playlist by ID without any authentication or authorization check. Private playlists (including `watch_later` and `favorite` types) are correctly hidden from listing endpoints via `playlistsFromUser.json.php`, but their contents are directly accessible through this endpoint by providing the sequential integer `playlists_id` para

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages2 packages

NVDwwbn/avideo26.0
Packagistwwbn/avideo26.0

Patches

🔴Vulnerability Details

2
GHSA
AVideo: Unauthenticated IDOR in playlistsVideos.json.php Exposes Private Playlist Contents2026-03-26
OSV
AVideo: Unauthenticated IDOR in playlistsVideos.json.php Exposes Private Playlist Contents2026-03-26

🕵️Threat Intelligence

1
Wiz
CVE-2026-33759 Impact, Exploitability, and Mitigation Steps | Wiz