High severityNVD Advisory· Published Mar 6, 2026· Updated Mar 6, 2026
WWBN AVideo: Unauthenticated PHP session store exposed to host network via published memcached port
CVE-2026-29093
Description
WWBN AVideo is an open source video platform. Prior to version 24.0, the official docker-compose.yml publishes the memcached service on host port 11211 (0.0.0.0:11211) with no authentication, while the Dockerfile configures PHP to store all user sessions in that memcached instance. An attacker who can reach port 11211 can read, modify, or flush session data — enabling session hijacking, admin impersonation, and mass session destruction without any application-level authentication. This issue has been patched in version 24.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | <= 21.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-xxpw-32hf-q8v9ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-29093ghsaADVISORY
- github.com/WWBN/AVideo/releases/tag/24.0ghsax_refsource_MISCWEB
- github.com/WWBN/AVideo/security/advisories/GHSA-xxpw-32hf-q8v9ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.