WWBN AVideo is an open source video platform. Versions 25.0 and below are vulnerable to unauthenticated application takeover through the install/checkConfiguration.php endpoint. install/checkConfiguration.php performs full application initialization: database setup, admin account creation, and configuration file write, all from an unauthenticated POST input. The only guard is checking whether videos/configuration.php already exists. On uninitialized deployments, any remote attacker can complete the installation with attacker-controlled credentials and an attacker-controlled database, gaining full administrative access. This issue has been fixed in version 26.0.
References
| Link | Resource |
|---|---|
| https://github.com/WWBN/AVideo/commit/b3fa7869dcb935c8ab5c001a88dc29d2f92cf8e1 | Patch |
| https://github.com/WWBN/AVideo/security/advisories/GHSA-2f9h-23f7-8gcx | Exploit Vendor Advisory |
| https://github.com/WWBN/AVideo/security/advisories/GHSA-2f9h-23f7-8gcx | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-20 06:16
Updated : 2026-03-23 16:24
NVD link : CVE-2026-33038
Mitre link : CVE-2026-33038
CVE.ORG link : CVE-2026-33038
JSON object : View
Products Affected
wwbn
- avideo
CWE
CWE-306
Missing Authentication for Critical Function
