CVE-2026-41056
Description
WWBN AVideo is an open source video platform. In versions 29.0 and below, the allowOrigin($allowAll=true) function in objects/functions.php reflects any arbitrary Origin header back in Access-Control-Allow-Origin along with Access-Control-Allow-Credentials: true. This function is called by both plugin/API/get.json.php and plugin/API/set.json.php — the primary API endpoints that handle user data retrieval, authentication, livestream credentials, and state-changing operations. Combined with the application's SameSite=None session cookie policy, any website can make credentialed cross-origin requests and read authenticated API responses, enabling theft of user PII, livestream keys, and performing state changes on behalf of the victim. Commit caf705f38eae0ccfac4c3af1587781355d24495e contains a fix.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | <= 29.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/WWBN/AVideo/commit/caf705f38eae0ccfac4c3af1587781355d24495envdPatchWEB
- github.com/WWBN/AVideo/security/advisories/GHSA-ccq9-r5cw-5hwqnvdExploitMitigationVendor AdvisoryWEB
- github.com/advisories/GHSA-ccq9-r5cw-5hwqghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-41056ghsaADVISORY
News mentions
0No linked articles in our index yet.