Skip to main content

Missing Authorization


Severity Medium
Score 5/10


Multiple authentication bypass vulnerabilities exist in the objects id handling functionality of WWBN AVideo versions prior to 12.4. A specially-crafted HTTP request by an authenticated user can lead to unauthorized access and takeover of resources. An attacker can send an HTTP request to trigger this vulnerability. This vulnerability exists in the Playlists plugin, allowing an attacker to bypass authentication by guessing a sequential ID, allowing them to take over the another user's playlists.

  • HIGH
  • LOW
  • NONE
  • LOW
  • LOW
  • LOW

CWE-862 - Missing Authorization

The missing authorization vulnerability occurs when a software program allows users to access privileged parts of the program without verifying the user credentials. Impact of such a vulnerability depends on the resources employed by the software, ranging from account takeover to sensitive information exposure, denial of service, and complete system takeover.

Advisory Timeline

  • Published