CVE-2026-40929
Description
WWBN AVideo is an open source video platform. In versions 29.0 and prior, objects/commentDelete.json.php is a state-mutating JSON endpoint that deletes comments but performs no CSRF validation. It does not call forbidIfIsUntrustedRequest(), does not verify a CSRF/global token, and does not check Origin/Referer. Because AVideo intentionally sets session.cookie_samesite=None (to support cross-origin embed players), a cross-site request from any attacker-controlled page automatically carries the victim's PHPSESSID. Any authenticated victim who has authority to delete one or more comments (site moderators, video owners, and comment authors) can be tricked into deleting comments en masse simply by visiting an attacker page. Commit 184f36b1896f3364f864f17c1acca3dd8df3af27 contains a fix.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | <= 29.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/WWBN/AVideo/commit/184f36b1896f3364f864f17c1acca3dd8df3af27nvdPatchWEB
- github.com/WWBN/AVideo/security/advisories/GHSA-8qm8-g55h-xmqrnvdExploitMitigationVendor AdvisoryWEB
- github.com/advisories/GHSA-8qm8-g55h-xmqrghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-40929ghsaADVISORY
News mentions
0No linked articles in our index yet.