| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2mg4-pfgx-64cf | AVideo's WebSocket Token Never Expires Due to Commented-Out Timeout Validation in verifyTokenSocket() |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 31 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:* |
Tue, 31 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wwbn
Wwbn avideo |
|
| Vendors & Products |
Wwbn
Wwbn avideo |
Fri, 27 Mar 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `verifyTokenSocket()` function in `plugin/YPTSocket/functions.php` has its token timeout validation commented out, causing WebSocket tokens to never expire despite being generated with a 12-hour timeout. This allows captured or legitimately obtained tokens to provide permanent WebSocket access, even after user accounts are deleted, banned, or demoted from admin. Admin tokens grant access to real-time connection data for all online users including IP addresses, browser info, and page locations. Commit 5d5237121bf82c24e9e0fdd5bc1699f1157783c5 fixes the issue. | |
| Title | AVideo's WebSocket Token Never Expires Due to Commented-Out Timeout Validation in verifyTokenSocket() | |
| Weaknesses | CWE-613 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-31T13:30:30.433Z
Reserved: 2026-03-27T13:43:14.368Z
Link: CVE-2026-34362
Updated: 2026-03-31T13:30:27.505Z
Status : Analyzed
Published: 2026-03-27T17:16:30.370
Modified: 2026-03-31T16:32:59.580
Link: CVE-2026-34362
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:00:56Z
Github GHSA