CVE-2026-34364Incorrect Authorization in Avideo

Severity
5.3MEDIUMNVD
EPSS
0.0%
top 98.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 27
Latest updateMar 30

Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `categories.json.php` endpoint, which serves the category listing API, fails to enforce user group-based access controls on categories. In the default request path (no `?user=` parameter), user group filtering is entirely skipped, exposing all non-private categories including those restricted to specific user groups. When the `?user=` parameter is supplied, a type confusion bug causes the filter to use the ad

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages2 packages

CVEListV5wwbn/avideo26.0
Packagistwwbn/avideo26.0

🔴Vulnerability Details

2
GHSA
AVideo has User Group-Based Category Access Control Bypass via Missing and Broken Group Filtering in categories.json.php2026-03-30
OSV
AVideo has User Group-Based Category Access Control Bypass via Missing and Broken Group Filtering in categories.json.php2026-03-30

🕵️Threat Intelligence

1
Wiz
CVE-2026-34364 Impact, Exploitability, and Mitigation Steps | Wiz