CVE-2026-34613
Description
WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AVideo endpoint objects/pluginSwitch.json.php allows administrators to enable or disable any installed plugin. The endpoint checks for an active admin session but does not validate a CSRF token. Additionally, the plugins database table is explicitly listed in ignoreTableSecurityCheck(), which means the ORM-level Referer/Origin domain validation in ObjectYPT::save() is also bypassed. Combined with SameSite=None on session cookies, an attacker can disable critical security plugins (such as LoginControl for 2FA, subscription enforcement, or access control plugins) by luring an admin to a malicious page. At time of publication, there are no publicly available patches.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | <= 26.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/WWBN/AVideo/security/advisories/GHSA-hqxf-mhfw-rc44nvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-hqxf-mhfw-rc44ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-34613ghsaADVISORY
- github.com/WWBN/AVideo/commit/7ddfe4ec270d720e11f5dc28db73dfcd2cf9192aghsaWEB
- github.com/WWBN/AVideo/commit/da375103d59118d1c1b1801ac7fce3cd426f8736ghsaWEB
News mentions
0No linked articles in our index yet.