Moderate severityNVD Advisory· Published Mar 23, 2026· Updated Mar 24, 2026
AVideo vulnerable to IP Address Spoofing via Untrusted HTTP Headers in getRealIpAddr()
CVE-2026-33690
Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the getRealIpAddr() function in objects/functions.php trusts user-controlled HTTP headers to determine the client's IP address. An attacker can spoof their IP address by sending forged headers, bypassing any IP-based access controls or audit logging. Commit 1a1df6a9377e5cc67d1d0ac8ef571f7abbffbc6c contains a patch.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | <= 26.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-8p2x-5cpm-qrqwghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33690ghsaADVISORY
- github.com/WWBN/AVideo/commit/1a1df6a9377e5cc67d1d0ac8ef571f7abbffbc6cghsax_refsource_MISCWEB
- github.com/WWBN/AVideo/security/advisories/GHSA-8p2x-5cpm-qrqwghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.