Home

Description

WWBN AVideo is an open source video platform. In versions 29.0 and prior, three admin-only JSON endpoints — `objects/categoryAddNew.json.php`, `objects/categoryDelete.json.php`, and `objects/pluginRunUpdateScript.json.php` — enforce only a role check (`Category::canCreateCategory()` / `User::isAdmin()`) and perform state-changing actions against the database without calling `isGlobalTokenValid()` or `forbidIfIsUntrustedRequest()`. Peer endpoints in the same directory (`pluginSwitch.json.php`, `pluginRunDatabaseScript.json.php`) do enforce the CSRF token, so the missing checks are an omission rather than a design choice. An attacker who lures a logged-in admin to a malicious page can create, update, or delete categories and force execution of any installed plugin's `updateScript()` method in the admin's session. Commit ee5615153c40628ab3ec6fe04962d1f92e67d3e2 contains a fix.

PUBLISHED Reserved 2026-04-15 | Published 2026-04-21 | Updated 2026-04-22 | Assigner GitHub_M




HIGH: 7.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L

Problem types

CWE-352: Cross-Site Request Forgery (CSRF)

Product status

<= 29.0
affected

References

github.com/...AVideo/security/advisories/GHSA-ffw8-fwxp-h64w exploit

github.com/...AVideo/security/advisories/GHSA-ffw8-fwxp-h64w

github.com/...ommit/ee5615153c40628ab3ec6fe04962d1f92e67d3e2

cve.org (CVE-2026-40926)

nvd.nist.gov (CVE-2026-40926)

Download JSON