AVideo Allows Unauthenticated Live Stream Control via Token Verification URL Override in control.json.php
Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the standalone live stream control endpoint at plugin/Live/standAloneFiles/control.json.php accepts a user-supplied streamerURL parameter that overrides where the server sends token verification requests. An attacker can redirect token verification to a server they control that always returns {"error": false}, completely bypassing authentication. This grants unauthenticated control over any live stream on the platform, including dropping active publishers, starting/stopping recordings, and probing stream existence. Commit 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128 contains a patch.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | <= 26.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-9hv9-gvwm-95f2ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33716ghsaADVISORY
- github.com/WWBN/AVideo/commit/388fcd57dbd16f6cb3ebcdf1d08cf2b929941128ghsax_refsource_MISCWEB
- github.com/WWBN/AVideo/security/advisories/GHSA-9hv9-gvwm-95f2ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.