WWBN AVideo Unauthenticated decryptString Vulnerability
WWBN AVideo, up to version 26.0, contains an improper authentication vulnerability (CVE-2026-33512) in the API plugin's `decryptString` action, allowing unauthenticated users to decrypt publicly accessible ciphertext and potentially recover protected tokens/metadata.
WWBN AVideo is an open-source video platform. Versions up to and including 26.0 are vulnerable to an improper authentication issue within the API plugin. The decryptString action, intended for internal decryption processes, is exposed without any authentication requirements. Attackers can exploit this vulnerability to submit ciphertext, which is publicly accessible through endpoints like view/url2Embed.json.php, and receive the corresponding plaintext. Successful exploitation allows…
Detection coverage 2
Detect AVideo Unauthenticated decryptString Request
highDetects unauthenticated requests to the AVideo decryptString API endpoint, indicative of CVE-2026-33512 exploitation attempts.
Detect AVideo Public Ciphertext Access
lowDetects access to the public ciphertext endpoint url2Embed.json.php which may be used to gather ciphertext for CVE-2026-33512 exploitation.
Detection queries are kept inside the platform. Get full rules →