WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `getRealIpAddr()` function in `objects/functions.php` trusts user-controlled HTTP headers to determine the client's IP address. An attacker can spoof their IP address by sending forged headers, bypassing any IP-based access controls or audit logging. Commit 1a1df6a9377e5cc67d1d0ac8ef571f7abbffbc6c contains a patch.
References
| Link | Resource |
|---|---|
| https://github.com/WWBN/AVideo/commit/1a1df6a9377e5cc67d1d0ac8ef571f7abbffbc6c | Patch |
| https://github.com/WWBN/AVideo/security/advisories/GHSA-8p2x-5cpm-qrqw | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-23 19:16
Updated : 2026-03-25 15:06
NVD link : CVE-2026-33690
Mitre link : CVE-2026-33690
CVE.ORG link : CVE-2026-33690
JSON object : View
Products Affected
wwbn
- avideo
CWE
CWE-348
Use of Less Trusted Source
