CVE-2026-33763 PUBLISHED

AVideo has an Unauthenticated Video Password Brute-Force Vulnerability via Unrate-Limited Boolean Oracle

Assigner: GitHub_M
Reserved: 23.03.2026 Published: 27.03.2026 Updated: 27.03.2026

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the get_api_video_password_is_correct API endpoint allows any unauthenticated user to verify whether a given password is correct for any password-protected video. The endpoint returns a boolean passwordIsCorrect field with no rate limiting, CAPTCHA, or authentication requirement, enabling efficient offline-speed brute-force attacks against video passwords. Commit 01a0614fedcdaee47832c0d913a0fb86d8c28135 contains a patch.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS Score: 5.3

Product Status

Vendor WWBN
Product AVideo
Versions
  • Version <= 26.0 is affected

References

Problem Types

  • CWE-307: Improper Restriction of Excessive Authentication Attempts CWE