AVideo has Authorization Bypass via Path Traversal in HLS Endpoint Allows Streaming Private/Paid Videos
Description
WWBN AVideo is an open source video platform. Prior to version 26.0, the HLS streaming endpoint (view/hls.php) is vulnerable to a path traversal attack that allows an unauthenticated attacker to stream any private or paid video on the platform. The videoDirectory GET parameter is used in two divergent code paths — one for authorization (which truncates at the first / segment) and one for file access (which preserves .. traversal sequences) — creating a split-oracle condition where authorization is checked against one video while content is served from another. Version 26.0 contains a fix for the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | <= 25.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-pw4v-x838-w5pgghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33292ghsaADVISORY
- github.com/WWBN/AVideo/commit/bc034066281085af00e64b0d7b81d8a025a928c4ghsax_refsource_MISCWEB
- github.com/WWBN/AVideo/security/advisories/GHSA-pw4v-x838-w5pgghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.