Remote Code Execution in WWBN AVideo YPTSocket Plugin
CVE-2026-40911

10CRITICAL

Key Information:

Vendor

Wwbn

Status
Vendor
CVE Published:
21 April 2026

What is CVE-2026-40911?

The YPTSocket plugin for the AVideo platform is susceptible to a significant vulnerability that allows unauthorized attackers to send malicious JavaScript to all connected clients, including administrators. This occurs due to the WebSocket server relaying unsanitized JSON message bodies and utilizing eval() functions without proper validation. Because the system enables token generation for anonymous users without subsequent revalidation, attackers can exploit this flaw to execute arbitrary code, leading to potentially severe ramifications such as account takeovers, session theft, and unauthorized access to privileged actions. A patch addressing this vulnerability has been implemented in a recent commit.

Affected Version(s)

AVideo <= 29.0

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.