Home

Description

WWBN AVideo is an open source video platform. In versions 29.0 and prior, the endpoint `plugin/Live/view/Live_restreams/list.json.php` contains an Insecure Direct Object Reference (IDOR) vulnerability that allows any authenticated user with streaming permission to retrieve other users' live restream configurations, including third-party platform stream keys and OAuth tokens (access_token, refresh_token) for services like YouTube Live, Facebook Live, and Twitch. Commit d5992fff2811df4adad1d9fc7d0a5837b882aed7 fixes the issue.

PUBLISHED Reserved 2026-04-15 | Published 2026-04-21 | Updated 2026-04-21 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

Product status

<= 29.0
affected

References

github.com/...AVideo/security/advisories/GHSA-gpgp-w4x2-h3h7 exploit

github.com/...AVideo/security/advisories/GHSA-gpgp-w4x2-h3h7

github.com/...ommit/d5992fff2811df4adad1d9fc7d0a5837b882aed7

cve.org (CVE-2026-40907)

nvd.nist.gov (CVE-2026-40907)

Download JSON