Authentication Bypass in WWBN AVideo Allows File Exposure
CVE-2026-39369

7.6HIGH

Key Information:

Vendor

Wwbn

Status
Vendor
CVE Published:
7 April 2026

What is CVE-2026-39369?

The WWBN AVideo platform, an open-source solution for video management, is vulnerable due to improper handling of requests in the objects/aVideoEncoderReceiveImage.json.php endpoint. This allows an authenticated uploader to exploit the vulnerability and access attacker-controlled URLs within the same origin. As a result, users can bypass the traversal scrubbing mechanism to read sensitive server files, such as /etc/passwd and other application source files, through publicly accessible GIF media URLs.

Affected Version(s)

AVideo <= 26.0

References

CVSS V3.1

Score:
7.6
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.