Cross-Site Request Forgery Vulnerability in WWBN AVideo Open Source Video Platform
CVE-2026-34613

6.5MEDIUM

Key Information:

Vendor

Wwbn

Status
Vendor
CVE Published:
31 March 2026

What is CVE-2026-34613?

WWBN AVideo, an open-source video platform, has a vulnerability in its plugin management feature. Specifically, the endpoint objects/pluginSwitch.json.php allows administrators to enable or disable installed plugins without validating the CSRF token. This omission permits an attacker, who can trick an admin into visiting a malicious page, to disable critical security plugins related to two-factor authentication and access control. Furthermore, the ORM-level security checks are bypassed due to the plugins database table being explicitly excluded from security checks, exacerbating the potential risk. As of the current date, no patches have been publicly released to address this vulnerability.

Affected Version(s)

AVideo <= 26.0

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.