PHP RCE (CVE-2026-33716)
CVE-2026-33716
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the standalone live stream control endpoint at `plugin/Live/standAloneFiles/control.json.php` accepts a user-supplie...
Overview
A critical security vulnerability has been discovered in WWBN AVideo, an open-source video platform. This flaw, tracked as CVE-2026-33716, allows an unauthenticated attacker to completely bypass authentication and take control of live streams on affected systems.
Vulnerability Details
In WWBN AVideo versions 26.0 and earlier, a specific live stream control endpoint (plugin/Live/standAloneFiles/control.json.php) is improperly secured. This endpoint accepts a user-controlled parameter called streamerURL. An attacker can manipulate this parameter to redirect the server’s authentication token verification request to a malicious server under their control. This malicious server can be configured to always return a successful authentication response, tricking the AVideo platform into granting full access.
Impact and Risks
The impact of this vulnerability is severe. By exploiting this flaw, an attacker can:
- Gain unauthenticated administrative control over any live stream on the platform.
- Drop or disconnect active publishers and streams.
- Start or stop stream recordings without authorization.
- Probe the system to discover the existence of specific streams. This can lead to complete disruption of live streaming services, unauthorized access to private streams, and data integrity breaches. For context on how such vulnerabilities can lead to real-world incidents, recent data breach reports are available at breach reports.
Affected Versions
All versions of WWBN AVideo up to and including version 26.0 are vulnerable.
Remediation and Mitigation
The primary and most critical action is to apply the official patch immediately.
- Patch Immediately: The vulnerability has been fixed in the source code. Administrators must update their installation by applying the patch from commit
388fcd57dbd16f6cb3ebcdf1d08cf2b929941128. If you are using a forked or custom version, ensure this security fix is integrated. - Update to a Secure Version: Upgrade to the latest version of WWBN AVideo released after this fix. Always obtain software from the official repository.
- Temporary Mitigation: If immediate patching is not possible, consider restricting network access to the AVideo application or disabling the standalone live stream feature until the update can be applied. However, patching is the only complete solution.
Stay informed about critical updates and other cybersecurity threats by following our security news section. This vulnerability underscores the importance of promptly applying security patches to all internet-facing software.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-33716?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
ApostropheCMS is an open-source content management framework. Prior to version 4.28.0, the bearer token authentication middleware in `@apostrophecms/express/index.js` (lines 386-389) contains an incor...
authentik is an open-source identity provider. Prior to 2025.8.6, 2025.10.4, and 2025.12.4, when using a SAML Source that has the option Verify Assertion Signature under Verification Certificate enabl...
An authentication bypass vulnerability in Network Service allows unauthorized access to protected resources...
Hirschmann HiOS and HiSecOS products RSP, RSPE, RSPS, RSPL, MSP, EES, EESX, GRS, OS, RED, EAGLE contain an authentication bypass vulnerability in the HTTP(S) management module that allows unauthentica...