CVE-2026-34369Missing Authorization in Avideo

Severity
5.3MEDIUMNVD
EPSS
0.1%
top 81.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 27
Latest updateMar 30

Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `get_api_video_file` and `get_api_video` API endpoints in AVideo return full video playback sources (direct MP4 URLs, HLS manifests) for password-protected videos without verifying the video password. While the normal web playback flow enforces password checks via the `CustomizeUser::getModeYouTube()` hook, this enforcement is completely absent from the API code path. An unauthenticated attacker can retrieve

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages2 packages

NVDwwbn/avideo26.0
Packagistwwbn/avideo26.0

Patches

🔴Vulnerability Details

2
GHSA
AVideo has Video Password Protection Bypass via API Endpoints Returning Full Playback Sources Without Password Verification2026-03-30
OSV
AVideo has Video Password Protection Bypass via API Endpoints Returning Full Playback Sources Without Password Verification2026-03-30

🕵️Threat Intelligence

1
Wiz
CVE-2026-34369 Impact, Exploitability, and Mitigation Steps | Wiz