PHP RCE (CVE-2026-33716)
CVE-2026-33716
CVE-2026-33716 grants unauthenticated admin control over any live stream in WWBN AVideo 26.0 and earlier, enabling stream takeover, disconnection, and unauthorized recordings. Apply the patch from commit 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128.
Patch now - CVE-2026-33716 is a critical authentication bypass in WWBN AVideo 26.0 and earlier that grants an unauthenticated attacker full administrative control over any live stream, enabling them to drop publishers, start or stop recordings, and probe for active streams. Apply the official patch from commit 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128 immediately.
Overview
A critical security vulnerability has been discovered in WWBN AVideo, an open-source video platform. This flaw, tracked as CVE-2026-33716, allows an unauthenticated attacker to completely bypass authentication and take control of live streams on affected systems.
Vulnerability Details
In WWBN AVideo versions 26.0 and earlier, a specific live stream control endpoint (plugin/Live/standAloneFiles/control.json.php) is improperly secured. This endpoint accepts a user-controlled parameter called streamerURL. An attacker can manipulate this parameter to redirect the server’s authentication token verification request to a malicious server under their control. This malicious server can be configured to always return a successful authentication response, tricking the AVideo platform into granting full access.
Impact and Risks
The impact of this vulnerability is severe. By exploiting this flaw, an attacker can:
- Gain unauthenticated administrative control over any live stream on the platform.
- Drop or disconnect active publishers and streams.
- Start or stop stream recordings without authorization.
- Probe the system to discover the existence of specific streams. This can lead to complete disruption of live streaming services, unauthorized access to private streams, and data integrity breaches. For context on how such vulnerabilities can lead to real-world incidents, recent data breach reports are available at breach reports.
Affected Versions
All versions of WWBN AVideo up to and including version 26.0 are vulnerable.
Remediation and Mitigation
The primary and most critical action is to apply the official patch immediately.
- Patch Immediately: The vulnerability has been fixed in the source code. Administrators must update their installation by applying the patch from commit
388fcd57dbd16f6cb3ebcdf1d08cf2b929941128. If you are using a forked or custom version, ensure this security fix is integrated. - Update to a Secure Version: Upgrade to the latest version of WWBN AVideo released after this fix. Always obtain software from the official repository.
- Temporary Mitigation: If immediate patching is not possible, consider restricting network access to the AVideo application or disabling the standalone live stream feature until the update can be applied. However, patching is the only complete solution.
Stay informed about critical updates and other cybersecurity threats by following our security news section. This vulnerability underscores the importance of promptly applying security patches to all internet-facing software.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-33716?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
WWBN AVideo is an open source video platform. Prior to version 26.0, the `setPassword.json.php` endpoint in the CustomizeUser plugin allows administrators to set a channel password for any user. Due t...
WWBN AVideo is an open source video platform. Prior to version 26.0, a Server-Side Request Forgery (SSRF) vulnerability exists in `plugin/Live/standAloneFiles/saveDVR.json.php`. When the AVideo Live p...
WWBN AVideo is an open source video platform. Prior to version 26.0, an unauthenticated SQL injection vulnerability exists in `objects/category.php` in the `getAllCategories()` method. The `doNotShowC...
WWBN AVideo is an open source video platform. In versions up to and including 26.0, multiple vulnerabilities in AVideo's CloneSite plugin chain together to allow a completely unauthenticated attacker ...
Other Wwbn Avideo Vulnerabilities
WWBN AVideo is an open source video platform. In versions up to and including 29.0, an incomplete fix for AVideo's `test.php` adds `escapeshellarg` for wget but leaves the `file_get_contents` and `cur...
WWBN AVideo is an open source video platform. In versions 29.0 and prior, the YPTSocket plugin's WebSocket server relays attacker-supplied JSON message bodies to every connected client without sanitiz...
WWBN AVideo is an open source video platform. Prior to version 26.0, the `setPassword.json.php` endpoint in the CustomizeUser plugin allows administrators to set a channel password for any user. Due t...
WWBN AVideo is an open source video platform. Prior to version 26.0, a Server-Side Request Forgery (SSRF) vulnerability exists in `plugin/Live/standAloneFiles/saveDVR.json.php`. When the AVideo Live p...