CVE-2026-34740
Description
WWBN AVideo is an open source video platform. In versions 26.0 and prior, the EPG (Electronic Program Guide) link feature in AVideo allows authenticated users with upload permissions to store arbitrary URLs that the server fetches on every EPG page visit. The URL is validated only with PHP's FILTER_VALIDATE_URL, which accepts internal network addresses. Although AVideo has a dedicated isSSRFSafeURL() function for preventing SSRF, it is not called in this code path. This results in a stored server-side request forgery vulnerability that can be used to scan internal networks, access cloud metadata services, and interact with internal services. At time of publication, there are no publicly available patches.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | <= 26.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/WWBN/AVideo/security/advisories/GHSA-x5vx-vrpf-r45fnvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-x5vx-vrpf-r45fghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-34740ghsaADVISORY
- github.com/WWBN/AVideo/commit/677d1a314d46abce457c7b662afbb58b0d9f17a2ghsaWEB
News mentions
0No linked articles in our index yet.