CVE-2026-34738Improper Authorization in Avideo

Severity
4.3MEDIUMNVD
EPSS
0.0%
top 93.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 31
Latest updateApr 1

Description

WWBN AVideo is an open source video platform. In versions 26.0 and prior, AVideo's video processing pipeline accepts an overrideStatus request parameter that allows any uploader to set a video's status to any valid state, including "active" (a). This bypasses the admin-controlled moderation and draft workflows. The setStatus() method validates the status code against a list of known values but does not verify that the caller has permission to set that particular status. As a result, any user wit

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages2 packages

NVDwwbn/avideo26.0
Packagistwwbn/avideo26.0

🔴Vulnerability Details

2
OSV
AVideo: Video Publishing Workflow Bypass via Unauthorized overrideStatus Request Parameter2026-04-01
GHSA
AVideo: Video Publishing Workflow Bypass via Unauthorized overrideStatus Request Parameter2026-04-01

🕵️Threat Intelligence

1
Wiz
CVE-2026-34738 Impact, Exploitability, and Mitigation Steps | Wiz