CVE-2026-33292

WWBN AVideo is an open source video platform. Prior to version 26.0, the HLS streaming endpoint (`view/hls.php`) is vulnerable to a path traversal attack that allows an unauthenticated attacker to stream any private or paid video on the platform. The `videoDirectory` GET parameter is used in two divergent code paths — one for authorization (which truncates at the first `/` segment) and one for file access (which preserves `..` traversal sequences) — creating a split-oracle condition where authorization is checked against one video while content is served from another. Version 26.0 contains a fix for the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-22 17:17

Updated : 2026-03-23 16:18


NVD link : CVE-2026-33292

Mitre link : CVE-2026-33292

CVE.ORG link : CVE-2026-33292


JSON object : View

Products Affected

wwbn

  • avideo
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')