Description
WWBN AVideo is an open source video platform. Prior to version 22.0, the `aVideoEncoder.json.php` API endpoint accepts a `downloadURL` parameter and fetches the referenced resource server-side without proper validation or an allow-list. This allows authenticated users to trigger server-side requests to arbitrary URLs (including internal network endpoints). An authenticated attacker can leverage SSRF to interact with internal services and retrieve sensitive data (e.g., internal APIs, metadata services), potentially leading to further compromise depending on the deployment environment. This issue has been fixed in AVideo version 22.0.
References (3)
Core 3
Core References
Release Notes x_refsource_misc
https://github.com/WWBN/AVideo/releases/tag/22.0
Vendor Advisory x_refsource_confirm
https://github.com/WWBN/AVideo/security/advisories/GHSA-h39h-7cvg-q7j6
Patch x_refsource_misc
https://github.com/WWBN/AVideo/commit/384ef2548093f4cbb1bfac00f1f429fe57fab853
Scores
CVSS v3
8.1
EPSS
0.0004
EPSS Percentile
10.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-918
Status
published
Products (2)
wwbn/avideo
< 22.0
wwbn/avideo
0Packagist
Published
Feb 24, 2026
Tracked Since
Feb 24, 2026