CVE-2026-33649 - Vulnerability Analysis
HighCVSS: 8.1Last Updated: March 24, 2026
WWBN AVideo - Cross-Site Request Forgery
Overview
WWBN AVideo <= 26.0 contains a cross-site request forgery vulnerability caused by lack of CSRF token validation in plugin/Permissions/setPermission.json.php, letting unauthenticated attackers escalate privileges by tricking admins, exploit requires admin to visit attacker-controlled page.
Severity & Score
Impact
Unauthenticated attackers can escalate privileges to near-admin by tricking admins into visiting malicious pages.
Mitigation
Update to the latest version once a patch is available or implement CSRF token validation and secure cookie settings.
Social Media Activity(2 posts)
š CVE-2026-33649 - High (8.1) WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/Permissions/setPermission.json.php` endpoint accepts GET parameters for a state-changing operation that modifies user group permissions. The endpoint h... š https://www.thehackerwire.com/vulnerability/CVE-2026-33649/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-33649 - High (8.1) WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/Permissions/setPermission.json.php` endpoint accepts GET parameters for a state-changing operation that modifies user group permissions. The endpoint h... š https://www.thehackerwire.com/vulnerability/CVE-2026-33649/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-33649
- Severity
- High
- CVSS Score
- 8.1
- Type
- cross_site_request_forgery
- Status
- unconfirmed
- EPSS
- 1.4%
- Social Posts
- 2
CWE
- CWE-352
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N