GHSA-x2pw-9c38-cp2j: WWBN AVideo: Missing CSRF Protection on State-Changing JSON Endpoints Enables Forced Comment Creation, Vote Manipulation, and Category Asset Deletion
Multiple AVideo JSON endpoints under objects/ accept state-changing requests via $_REQUEST/$_GET and persist changes tied to the caller’s session user, without any anti-CSRF token, origin check, or referer check. A malicious page visited by a logged-in victim can silently:
- Cast/flip the victim’s like/dislike on any comment (
objects/comments_like.json.php). - Post a comment authored by the victim on any video, with attacker-chosen text (
objects/commentAddNew.json.php). - Delete assets from any category (
objects/categoryDeleteAssets.json.php) when the victim has category management rights.
Each endpoint is reachable from a browser via a simple <img src="…"> tag or form submission, so exploitation only requires the victim to load an attacker-controlled HTML resource.
References
Code Behaviors & Features
Detect and mitigate GHSA-x2pw-9c38-cp2j with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →