WWBN AVideo SSRF Bypass via Redirects (CVE-2026-43884)
The National Vulnerability Database has detailed CVE-2026-43884, a high-severity Server-Side Request Forgery (SSRF) bypass impacting WWBN AVideo, an open-source video platform. Versions up to and including 29.0 are vulnerable. The flaw lies in two endpoints, plugin/AI/receiveAsync.json.php and objects/EpgParser.php, which utilize file_get_contents() to fetch user-supplied URLs after a isSSRFSafeURL() validation.
The critical error, as outlined by the National Vulnerability Database, is the failure to disable PHP’s automatic redirect following. An attacker can supply a URL pointing to a controlled server, which then issues a 302 redirect to an internal or cloud-metadata address (e.g., http://169.254.169.254/latest/meta-data/). Because isSSRFSafeURL() only validates the initial URL, the redirect target completely bypasses the intended SSRF protections, granting access to sensitive internal resources. The National Vulnerability Database notes that commit 603e7bf77a835584387327e35560262feb075db3 contains an updated fix.
What This Means For You
- If your organization uses WWBN AVideo, you need to patch immediately. This isn't theoretical; an attacker can weaponize this to access your cloud metadata, internal services, or sensitive configuration data. This is a direct path to deeper compromise, lateral movement, and data exfiltration. Don't wait for an active exploit to surface; the attack vector is clear.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
SSRF Bypass via Redirect to Cloud Metadata - CVE-2026-43884
title: SSRF Bypass via Redirect to Cloud Metadata - CVE-2026-43884
id: scw-2026-05-11-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-43884 by sending a URL to the vulnerable AVideo endpoints that redirects to the cloud metadata service (169.254.169.254). This bypasses SSRF protections by exploiting the automatic redirect following in file_get_contents().
author: SCW Feed Engine (AI-generated)
date: 2026-05-11
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-43884/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/plugin/AI/receiveAsync.json.php'
- '/objects/EpgParser.php'
cs-uri-query|contains:
- 'http://169.254.169.254'
- 'http://169.254.169.254/latest/meta-data/'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-43884 | SSRF | WWBN AVideo versions up to and including 29.0 |
| CVE-2026-43884 | SSRF | Vulnerable endpoint: plugin/AI/receiveAsync.json.php |
| CVE-2026-43884 | SSRF | Vulnerable endpoint: objects/EpgParser.php |
| CVE-2026-43884 | SSRF | Vulnerable function: file_get_contents() with automatic redirect following |
| CVE-2026-43884 | SSRF | Bypass of isSSRFSafeURL() via 302 redirect to internal/cloud-metadata addresses (e.g., http://169.254.169.254/latest/meta-data/) |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 12, 2026 at 01:22 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.