CVE-2026-39368Server-Side Request Forgery in Avideo

Severity
6.5MEDIUMNVD
EPSS
0.0%
top 91.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 7
Latest updateApr 8

Description

WWBN AVideo is an open source video platform. In versions 26.0 and prior, the Live restream log callback flow accepted an attacker-controlled restreamerURL and later fetched that stored URL server-side, enabling stored SSRF for authenticated streamers. The vulnerable flow allowed a low-privilege user with streaming permission to store an arbitrary callback URL and trigger server-side requests to loopback or internal HTTP services through the restream log feature.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

CVEListV5wwbn/avideo26.0
Packagistwwbn/avideo26.0

🔴Vulnerability Details

1
GHSA
WWBN AVideo has a Live restream log callback flow enabling stored SSRF to internal services2026-04-08

🕵️Threat Intelligence

1
Wiz
CVE-2026-39368 Impact, Exploitability, and Mitigation Steps | Wiz