AVideo has Session Fixation via GET PHPSESSID Parameter With Disabled Login Session Regeneration
Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, AVideo's _session_start() function accepts arbitrary session IDs via the PHPSESSID GET parameter and sets them as the active PHP session. A session regeneration bypass exists for specific blacklisted endpoints when the request originates from the same domain. Combined with the explicitly disabled session regeneration in User::login(), this allows a classic session fixation attack where an attacker can fix a victim's session ID before authentication and then hijack the authenticated session. Commit 5647a94d79bf69a972a86653fe02144079948785 contains a patch.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | <= 26.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-x3pr-vrhq-vq43ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33492ghsaADVISORY
- github.com/WWBN/AVideo/commit/5647a94d79bf69a972a86653fe02144079948785ghsax_refsource_MISCWEB
- github.com/WWBN/AVideo/security/advisories/GHSA-x3pr-vrhq-vq43ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.