CVE-2026-41060
Description
WWBN AVideo is an open source video platform. In versions 29.0 and below, the isSSRFSafeURL() function in objects/functions.php contains a same-domain shortcircuit (lines 4290-4296) that allows any URL whose hostname matches webSiteRootURL to bypass all SSRF protections. Because the check compares only the hostname and ignores the port, an attacker can reach arbitrary ports on the AVideo server by using the site's public hostname with a non-standard port. The response body is saved to a web-accessible path, enabling full exfiltration. Commit a0156a6398362086390d949190f9d52a823000ba fixes the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | <= 29.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/WWBN/AVideo/commit/a0156a6398362086390d949190f9d52a823000banvdPatchWEB
- github.com/WWBN/AVideo/security/advisories/GHSA-j432-4w3j-3w8jnvdExploitMitigationVendor AdvisoryWEB
- github.com/advisories/GHSA-j432-4w3j-3w8jghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-41060ghsaADVISORY
News mentions
0No linked articles in our index yet.