Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-33502 β€” AI Deep Analysis Summary

CVSS 9.3 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: WWBN AVideo suffers from a Server-Side Request Forgery (SSRF) flaw.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-918 (SSRF). The `test.php` endpoint lacks proper **access control** and input validation. 🚫 It blindly processes requests without verifying the destination.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: WWBN AVideo. πŸ“… **Versions**: 26.0 and all previous versions. 🏒 **Vendor**: WWBN. 🐘 **Tech**: PHP-based video platform.

Q4What can hackers do? (Privileges/Data)

πŸ’» **Capabilities**: Hackers can perform SSRF attacks. πŸ•΅οΈ **Impact**: High Confidentiality loss (C:H), Low Integrity impact (I:L). They can access internal network resources or sensitive server-side data.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: LOW. 🌐 **Network**: Attack Vector is Network (AV:N). πŸ”‘ **Privileges**: None required (PR:N). πŸ–±οΈ **User Interaction**: None required (UI:N). Easy to exploit remotely.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Exploit Status**: No public PoC listed in data. πŸ“œ **References**: GitHub commit and GHSA advisory exist. ⚠️ **Risk**: Despite no public code, the flaw is critical and likely exploitable given the low barrier.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Check**: Scan for `test.php` endpoint on AVideo instances. πŸ“‘ **Method**: Look for SSRF vulnerabilities in PHP endpoints. πŸ› οΈ **Tool**: Use vulnerability scanners targeting CWE-918 on WWBN AVideo deployments.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. πŸ“ **Patch**: Commit `1e6cf03e93b5a5318204b010ea28440b0d9a5ab3` on GitHub. πŸ”— **Advisory**: GHSA-3fpm-8rjr-v5mc confirms the fix. Update immediately!

Q9What if no patch? (Workaround)

🚧 **Workaround**: If unpatched, **block external access** to `test.php` via WAF or firewall rules. πŸ›‘ Restrict network access to the AVideo admin interface. 🧱 Isolate the server.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: HIGH. 🚨 **Priority**: Critical (CVSS Base Score implies high severity). πŸƒ **Action**: Patch immediately. The lack of auth requirement makes this a prime target for automated attacks.