Home

Description

WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AVideo endpoint objects/pluginSwitch.json.php allows administrators to enable or disable any installed plugin. The endpoint checks for an active admin session but does not validate a CSRF token. Additionally, the plugins database table is explicitly listed in ignoreTableSecurityCheck(), which means the ORM-level Referer/Origin domain validation in ObjectYPT::save() is also bypassed. Combined with SameSite=None on session cookies, an attacker can disable critical security plugins (such as LoginControl for 2FA, subscription enforcement, or access control plugins) by luring an admin to a malicious page. At time of publication, there are no publicly available patches.

PUBLISHED Reserved 2026-03-30 | Published 2026-03-31 | Updated 2026-04-01 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Problem types

CWE-352: Cross-Site Request Forgery (CSRF)

Product status

<= 26.0
affected

References

github.com/...AVideo/security/advisories/GHSA-hqxf-mhfw-rc44

cve.org (CVE-2026-34613)

nvd.nist.gov (CVE-2026-34613)

Download JSON