AVideo has a PGP 2FA Bypass via Cryptographically Broken 512-bit RSA Key Generation in LoginControl Plugin
Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the createKeys() function in the LoginControl plugin's PGP 2FA system generates 512-bit RSA keys, which have been publicly factorable since 1999. An attacker who obtains a target user's public key can factor the 512-bit RSA modulus on commodity hardware in hours, derive the complete private key, and decrypt any PGP 2FA challenge issued by the system — completely bypassing the second authentication factor. Additionally, the generateKeys.json.php and encryptMessage.json.php endpoints lack any authentication checks, exposing CPU-intensive key generation to anonymous users. Commit 00d979d87f8182095c8150609153a43f834e351e contains a patch.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | <= 26.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-6m5f-j7w2-w953ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33488ghsaADVISORY
- github.com/WWBN/AVideo/commit/00d979d87f8182095c8150609153a43f834e351eghsax_refsource_MISCWEB
- github.com/WWBN/AVideo/security/advisories/GHSA-6m5f-j7w2-w953ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.