WWBN AVideo CVE-2026-43873: Shared Secret Leak Exposes Databases
The National Vulnerability Database has disclosed CVE-2026-43873, a high-severity vulnerability affecting WWBN AVideo, an open-source video platform. Versions up to and including 29.0 are impacted. The flaw resides in plugin/CloneSite/cloneClient.json.php, which inadvertently echoes the local CloneSite shared secret ($objClone->myKey) into HTTP response bodies for unauthenticated requests.
This isn’t just an information leak; it’s a critical authentication bypass. When AVideo is configured with a remote cloneSiteURL for federation or backup, this leaked myKey is precisely the credential used to authenticate to the remote server’s cloneServer.json.php. An attacker can leverage this to impersonate the victim’s AVideo instance, triggering a full mysqldump of the remote database directly into the remote server’s publicly accessible videos/clones/ directory. This is a complete database compromise, not just a configuration leak.
The National Vulnerability Database reports a CVSS v3.1 score of 7.5 (HIGH), citing the network attack vector and high confidentiality impact. A fix is available in commit e6566f56a28f4556b2a0a09d03717a719dcb49da. Defenders running AVideo must prioritize patching immediately, especially if utilizing the CloneSite feature with remote instances. The attacker’s calculus here is straightforward: unauthenticated request, secret disclosed, full database access.
What This Means For You
- If your organization uses WWBN AVideo, especially with the `CloneSite` federation or backup feature, you are directly exposed to full database compromise. Immediately verify your AVideo version. If it's up to and including 29.0, patch to the latest version or apply the fix from commit `e6566f56a28f4556b2a0a09d03717a719dcb49da`. After patching, assume the shared secret has been compromised and rotate any associated credentials or keys. Audit your `videos/clones/` directory for any unauthorized `mysqldump` files.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
AVideo CloneSite Shared Secret Leak - CVE-2026-43873
title: AVideo CloneSite Shared Secret Leak - CVE-2026-43873
id: scw-2026-05-11-ai-1
status: experimental
level: high
description: |
Detects the specific unauthenticated request to cloneClient.json.php that leaks the CloneSite shared secret in the HTTP response body, as described in CVE-2026-43873. This leak allows attackers to obtain credentials for remote clone site authentication.
author: SCW Feed Engine (AI-generated)
date: 2026-05-11
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-43873/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
uri|contains:
- '/plugin/CloneSite/cloneClient.json.php'
cs-uri-query|contains:
- 'cloneKey='
sc-status|exact:
- 200
selection_base:
uri|contains:
- '/plugin/CloneSite/cloneClient.json.php'
selection_error:
cs-uri-query|contains:
- 'cloneKey='
sc-status|exact:
- 500
condition: selection_base AND selection_error
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-43873 | Information Disclosure | WWBN AVideo versions up to and including 29.0 |
| CVE-2026-43873 | Information Disclosure | plugin/CloneSite/cloneClient.json.php leaks $objClone->myKey (md5($global['systemRootPath'] . $global['salt'])) |
| CVE-2026-43873 | Auth Bypass | Impersonation of victim to remote cloneServer.json.php using leaked myKey |
| CVE-2026-43873 | Information Disclosure | Remote database mysqldump to public videos/clones/ directory |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 12, 2026 at 01:22 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.