Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. wwbn/avideo
  4. ›
  5. CVE-2026-40929

CVE-2026-40929: WWBN AVideo is missing CSRF protection in objects/commentDelete.json.php enables mass comment deletion against moderators and content creators

April 14, 2026 (updated April 24, 2026)

objects/commentDelete.json.php is a state-mutating JSON endpoint that deletes comments but performs no CSRF validation. It does not call forbidIfIsUntrustedRequest(), does not verify a CSRF/global token, and does not check Origin/Referer. Because AVideo intentionally sets session.cookie_samesite=None (to support cross-origin embed players), a cross-site request from any attacker-controlled page automatically carries the victim’s PHPSESSID. Any authenticated victim who has authority to delete one or more comments (site moderators, video owners, and comment authors) can be tricked into deleting comments en masse simply by visiting an attacker page.

References

  • github.com/WWBN/AVideo
  • github.com/WWBN/AVideo/commit/184f36b1896f3364f864f17c1acca3dd8df3af27
  • github.com/WWBN/AVideo/security/advisories/GHSA-8qm8-g55h-xmqr
  • github.com/advisories/GHSA-8qm8-g55h-xmqr
  • nvd.nist.gov/vuln/detail/CVE-2026-40929

Code Behaviors & Features

Detect and mitigate CVE-2026-40929 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 29.0

Solution

Unfortunately, there is no solution available yet.

Impact 5.4 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-352: Cross-Site Request Forgery (CSRF)

Source file

packagist/wwbn/avideo/CVE-2026-40929.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:20:28 +0000.