CVE-2026-33039
EUVD-2026-1357920.03.2026, 06:16
WWBN AVideo is an open source video platform. In versions 25.0 and below, the plugin/LiveLinks/proxy.php endpoint validates user-supplied URLs against internal/private networks using isSSRFSafeURL(), but only checks the initial URL. When the initial URL responds with an HTTP redirect (Location header), the redirect target is fetched via fakeBrowser() without re-validation, allowing an attacker to reach internal services (cloud metadata, RFC1918 addresses) through an attacker-controlled redirect. This issue is fixed in version 26.0.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| wwbn | avideo | 𝑥 < 26.0 |
𝑥
= Vulnerable software versions