Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hj5h-5623-gwhw | AVideo has an Open Redirect via Unvalidated redirectUri in userLogin.php |
Tue, 24 Mar 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 23 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wwbn
Wwbn avideo |
|
| Vendors & Products |
Wwbn
Wwbn avideo |
Sun, 22 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WWBN AVideo is an open source video platform. Prior to version 26.0, WWBN/AVideo contains an open redirect vulnerability in the login flow where a user-supplied redirectUri parameter is reflected directly into a JavaScript `document.location` assignment without JavaScript-safe encoding. After a user completes the login popup flow, a timer callback executes the redirect using the unvalidated value, sending the victim to an attacker-controlled site. Version 26.0 fixes the issue. | |
| Title | AVideo has an Open Redirect via Unvalidated redirectUri in userLogin.php | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-23T14:00:36.993Z
Reserved: 2026-03-18T18:55:47.427Z
Link: CVE-2026-33296
Updated: 2026-03-23T14:00:26.714Z
Status : Analyzed
Published: 2026-03-22T17:17:09.420
Modified: 2026-03-24T17:52:46.437
Link: CVE-2026-33296
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:50:25Z
Github GHSA