Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. wwbn/avideo
  4. ›
  5. GHSA-ffw8-fwxp-h64w

GHSA-ffw8-fwxp-h64w: WWBN AVideo has Multiple CSRF Vulnerabilities in Admin JSON Endpoints (Category CRUD, Plugin Update Script)

April 14, 2026

Three admin-only JSON endpoints — objects/categoryAddNew.json.php, objects/categoryDelete.json.php, and objects/pluginRunUpdateScript.json.php — enforce only a role check (Category::canCreateCategory() / User::isAdmin()) and perform state-changing actions against the database without calling isGlobalTokenValid() or forbidIfIsUntrustedRequest(). Peer endpoints in the same directory (pluginSwitch.json.php, pluginRunDatabaseScript.json.php) do enforce the CSRF token, so the missing checks are an omission rather than a design choice. An attacker who lures a logged-in admin to a malicious page can create, update, or delete categories and force execution of any installed plugin’s updateScript() method in the admin’s session.

References

  • github.com/WWBN/AVideo
  • github.com/WWBN/AVideo/commit/ee5615153c40628ab3ec6fe04962d1f92e67d3e2
  • github.com/WWBN/AVideo/security/advisories/GHSA-ffw8-fwxp-h64w
  • github.com/advisories/GHSA-ffw8-fwxp-h64w

Code Behaviors & Features

Detect and mitigate GHSA-ffw8-fwxp-h64w with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 29.0

Solution

Unfortunately, there is no solution available yet.

Impact 7.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L

Learn more about CVSS

Weakness

  • CWE-352: Cross-Site Request Forgery (CSRF)

Source file

packagist/wwbn/avideo/GHSA-ffw8-fwxp-h64w.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:48 +0000.