CVE-2026-33039

WWBN AVideo is an open source video platform. In versions 25.0 and below, the plugin/LiveLinks/proxy.php endpoint validates user-supplied URLs against internal/private networks using isSSRFSafeURL(), but only checks the initial URL. When the initial URL responds with an HTTP redirect (Location header), the redirect target is fetched via fakeBrowser() without re-validation, allowing an attacker to reach internal services (cloud metadata, RFC1918 addresses) through an attacker-controlled redirect. This issue is fixed in version 26.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-20 06:16

Updated : 2026-03-23 16:22


NVD link : CVE-2026-33039

Mitre link : CVE-2026-33039

CVE.ORG link : CVE-2026-33039


JSON object : View

Products Affected

wwbn

  • avideo
CWE
CWE-918

Server-Side Request Forgery (SSRF)