CVE-2026-34613
EUVD-2026-1763931.03.2026, 21:16
WWBN AVideo is an open source video platform. In versions 26.0 and prior, the AVideo endpoint objects/pluginSwitch.json.php allows administrators to enable or disable any installed plugin. The endpoint checks for an active admin session but does not validate a CSRF token. Additionally, the plugins database table is explicitly listed in ignoreTableSecurityCheck(), which means the ORM-level Referer/Origin domain validation in ObjectYPT::save() is also bypassed. Combined with SameSite=None on session cookies, an attacker can disable critical security plugins (such as LoginControl for 2FA, subscription enforcement, or access control plugins) by luring an admin to a malicious page. At time of publication, there are no publicly available patches.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| wwbn | avideo | 𝑥 ≤ 26.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration