CVE-2026-34611Cross-Site Request Forgery in Avideo

Severity
6.5MEDIUMNVD
EPSS
0.0%
top 96.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 31
Latest updateApr 1

Description

WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AVideo endpoint objects/emailAllUsers.json.php allows administrators to send HTML emails to every registered user on the platform. While the endpoint verifies admin session status, it does not validate a CSRF token. Because AVideo sets SameSite=None on session cookies, a cross-origin POST request from an attacker-controlled page will include the admin's session cookie automatically. An attacker who lures an admin to a

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

NVDwwbn/avideo26.0
Packagistwwbn/avideo26.0

🔴Vulnerability Details

2
GHSA
AVideo: CSRF on emailAllUsers.json.php Enables Mass Phishing Email to All Users2026-04-01
OSV
AVideo: CSRF on emailAllUsers.json.php Enables Mass Phishing Email to All Users2026-04-01

🕵️Threat Intelligence

1
Wiz
CVE-2026-34611 Impact, Exploitability, and Mitigation Steps | Wiz