Home

Description

VideoLAN VLC for Android prior to version 3.7.0 contains an authentication bypass in the Remote Access Server feature due to missing or insufficient rate limiting on one-time password (OTP) verification. The Remote Access Server uses a 4-digit OTP and does not enforce effective throttling or lockout within the OTP validity window, allowing an attacker with network reachability to the server to repeatedly attempt OTP verification until a valid user_session cookie is issued. Successful exploitation results in unauthorized access to the Remote Access interface, limited to media files explicitly shared by the VLC for Android user.

PUBLISHED Reserved 2026-02-11 | Published 2026-02-26 | Updated 2026-02-26 | Assigner VulnCheck




MEDIUM: 6.3CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-307 Improper Restriction of Excessive Authentication Attempts

Product status

Default status
unaffected

Any version before 3.7.0
affected

Credits

XavLimSG finder

References

www.videolan.org/vlc/download-android.html product

https//github.com/videolan/vlc-android/releases/tag/3.7.0 patch

www.vulncheck.com/...remote-access-otp-authentication-bypass third-party-advisory

cve.org (CVE-2026-26227)

nvd.nist.gov (CVE-2026-26227)

Download JSON