SSRF Vulnerability in WWBN AVideo Open Source Video Platform
CVE-2026-43884

7.7HIGH

Key Information:

Vendor

Wwbn

Status
Vendor
CVE Published:
11 May 2026

What is CVE-2026-43884?

WWBN AVideo, an open-source video platform, is susceptible to a Server-Side Request Forgery (SSRF) vulnerability due to improper validation of user-input URLs in versions up to and including 29.0. This flaw arises from using the isSSRFSafeURL() function to check the initial input, while subsequent redirects—such as those returning a 302 status code to an internal address—bypass all existing SSRF safeguards. As a result, an attacker could exploit this vulnerability to redirect requests and gain unauthorized access to sensitive internal data, including cloud metadata services. A patch has been released to address this issue, improving overall security for users of the platform. For details on the fix, refer to the commit linked in the advisories.

Affected Version(s)

AVideo <= 29.0

References

CVSS V3.1

Score:
7.7
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.