CVE-2026-33237
Podatność w wtyczce Scheduler AVideo umożliwia atak SSRF, co pozwala na dostęp do wewnętrznych API i usług metadanych w chmurze.
WWBN AVideo is an open source video platform. Prior to version 26.0, the Scheduler plugin's `run()` function in `plugin/Scheduler/Scheduler.php` calls `url_get_contents()` with an admin-configurable `callbackURL` that is validated only by `isValidURL()` (URL format check). Unlike other AVideo endpoints that were recently patched for SSRF (GHSA-9x67-f2v7-63rw, GHSA-h39h-7cvg-q7j6), the Scheduler's callback URL is never passed through `isSSRFSafeURL()`, which blocks requests to RFC-1918 private addresses, loopback, and cloud metadata endpoints. An admin can configure a scheduled task with an internal network `callbackURL` to perform SSRF against cloud infrastructure metadata services or internal APIs not otherwise reachable from the internet. Version 26.0 contains a patch for the issue.
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 5.5 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-03-21 00:16:26 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-13 18:16:29 UTC |
- https://github.com/WWBN/AVideo/commit/df926e500580c2a1e3c70351f0c30f4e15c0fd83 (security-advisories@github.com) [Patch]
- https://github.com/WWBN/AVideo/issues/10403 (security-advisories@github.com)
- https://github.com/WWBN/AVideo/security/advisories/GHSA-v467-g7g7-hhfh (security-advisories@github.com) [Exploit, Mitigation, Vendor Advisory]