Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-34394— AVideo: CSRF on Admin Plugin Configuration Enables Payment Credential Hijacking

CVSS 8.1 · High EPSS 0.03% · P8
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-34394

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
AVideo: CSRF on Admin Plugin Configuration Enables Payment Credential Hijacking
Source: NVD (National Vulnerability Database)
Vulnerability Description
WWBN AVideo is an open source video platform. In versions 26.0 and prior, AVideo's admin plugin configuration endpoint (admin/save.json.php) lacks any CSRF token validation. There is no call to isGlobalTokenValid() or verifyToken() before processing the request. Combined with the application's explicit SameSite=None cookie policy, an attacker can forge cross-origin POST requests from a malicious page to overwrite arbitrary plugin settings on a victim administrator's session. Because the plugins table is included in the ignoreTableSecurityCheck() array in objects/Object.php, standard table-level access controls are also bypassed. This allows a complete takeover of platform functionality by reconfiguring payment processors, authentication providers, cloud storage credentials, and more. At time of publication, there are no publicly available patches.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
跨站请求伪造(CSRF)
Source: NVD (National Vulnerability Database)
Vulnerability Title
WWBN AVideo 跨站请求伪造漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WWBN AVideo是WWBN团队的一个由PHP编写的视频平台建站系统。 WWBN AVideo 26.0及之前版本存在跨站请求伪造漏洞,该漏洞源于管理员插件配置端点缺少CSRF令牌验证,可能导致跨站请求伪造攻击并接管平台功能。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
WWBNAVideo <= 26.0 -

II. Public POCs for CVE-2026-34394

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-34394

登录查看更多情报信息。

Same Patch Batch · WWBN · 2026-03-31 · 13 CVEs total

CVE-2026-347317.5 HIGHAVideo: Unauthenticated Live Stream Termination via RTMP Callback on_publish_done.php
CVE-2026-343956.5 MEDIUMAVideo: Mass User PII Disclosure via Missing Authorization in YPTWallet users.json.php
CVE-2026-346136.5 MEDIUMAVideo: CSRF on Plugin Enable/Disable Endpoint Allows Disabling Security Plugins
CVE-2026-347376.5 MEDIUMAVideo: Arbitrary Stripe Subscription Cancellation via Debug Endpoint and retrieveSubscrip
CVE-2026-346116.5 MEDIUMAVideo: CSRF on emailAllUsers.json.php Enables Mass Phishing Email to All Users
CVE-2026-347406.5 MEDIUMAVideo: Stored SSRF via Video EPG Link Missing isSSRFSafeURL() Validation
CVE-2026-347336.5 MEDIUMAVideo: Unauthenticated File Deletion via PHP Operator Precedence Bug in CLI Guard
CVE-2026-347166.4 MEDIUMAVideo: DOM XSS via Unsanitized Display Name in WebSocket Call Notification
CVE-2026-347396.1 MEDIUMAVideo: Reflected XSS via Unescaped ip Parameter in User_Location testIP.php
CVE-2026-343966.1 MEDIUMAVideo: Stored XSS via Unescaped Plugin Configuration Values in Admin Panel
CVE-2026-347325.3 MEDIUMAVideo: Missing Authentication in CreatePlugin list.json.php Template Affects 21 Endpoints
CVE-2026-347384.3 MEDIUMAVideo: Video Publishing Workflow Bypass via Unauthorized overrideStatus Request Parameter

IV. Related Vulnerabilities

V. Comments for CVE-2026-34394

No comments yet


Leave a comment