๐Ÿ” CVE Alert

CVE-2026-33292

HIGH 7.5

AVideo has Authorization Bypass via Path Traversal in HLS Endpoint Allows Streaming Private/Paid Videos

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
11th

WWBN AVideo is an open source video platform. Prior to version 26.0, the HLS streaming endpoint (`view/hls.php`) is vulnerable to a path traversal attack that allows an unauthenticated attacker to stream any private or paid video on the platform. The `videoDirectory` GET parameter is used in two divergent code paths โ€” one for authorization (which truncates at the first `/` segment) and one for file access (which preserves `..` traversal sequences) โ€” creating a split-oracle condition where authorization is checked against one video while content is served from another. Version 26.0 contains a fix for the issue.

CWE CWE-22
Vendor wwbn
Product avideo
Published Mar 22, 2026
Last Updated Mar 23, 2026
Stay Ahead of the Next One

Get instant alerts for wwbn avideo

Be the first to know when new high vulnerabilities affecting wwbn avideo are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

WWBN / AVideo
< 26.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/WWBN/AVideo/security/advisories/GHSA-pw4v-x838-w5pg github.com: https://github.com/WWBN/AVideo/commit/bc034066281085af00e64b0d7b81d8a025a928c4