CVE-2026-33480Monday, March 30, 2026

SSRF Bypass in WWBN AVideo

The isSSRFSafeURL() function in WWBN AVideo can be bypassed using IPv4-mapped IPv6 addresses, allowing unauthenticated access to internal networks, cloud metadata services, and localhost. This vulnerability affects WWBN AVideo versions <= 26.0 and can be exploited by sending a crafted request to the plugin/LiveLinks/proxy.php endpoint.

Not KEV Listed✓ Fix Available
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

A security flaw has been found in the WWBN AVideo platform, which is an open-source video platform. This flaw allows attackers to bypass security checks and access internal networks, cloud services, and even the localhost.

This can be done by using a special type of IP address that tricks the system into thinking it's a safe and allowed connection. This means that an attacker could potentially access sensitive information or take control of the system.

The good news is that a fix is available, and users can update their WWBN AVideo platform to the latest version to patch this vulnerability.

Affected Products

1affected product identified
ProductVendorVersionPatched
>WWBN AVideoWWBN<= 26.0>= 26.1
🔧

Remediation

Fix Available

The fix is available in commit 75ce8a579a58c9d4c7aafe453fbced002cb8f373. Users can update their WWBN AVideo platform to the latest version to patch this vulnerability.

✓ Apply vendor patches as available
🔗

Sources & References

CVSS Score
8.6
HighAV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
CVSS Vector (vunknown)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Quick Info
CVE IDCVE-2026-33480
Severityhigh
FixAvailable
KEVNot Listed
PublishedMar 30, 2026