AVideo's PayPal Handler Vulnerable to Transaction Replay Attacks

AVideo's PayPal Handler Vulnerable to Transaction Replay Attacks

CVE Notify is flagging a critical flaw in the WWBN AVideo open-source video platform, specifically affecting versions 26.0 and earlier. The issue lies within the older PayPal Instant Payment Notification (IPN) v1 handler, located at plugin/PayPalYPT/ipn.php. According to CVE Notify, this handler is missing crucial transaction deduplication logic. This oversight allows attackers to exploit a single, legitimate IPN notification by replaying it multiple times. The consequence? An attacker could artificially inflate their wallet balance or renew subscriptions indefinitely, effectively defrauding the platform.

While newer handlers like ipnV2.php and webhook.php have implemented proper deduplication by referencing PayPalYPT_log entries, the outdated v1 handler remains a significant risk. CVE Notify points out that this vulnerable script is still actively referenced as the notify_url for existing billing plans. This means that even if users aren’t aware of the older handler, systems configured to use it are susceptible to this replay attack.

The vulnerability, tracked as CVE-2026-39366, highlights the persistent danger of maintaining legacy code, especially in payment processing modules. The fix, referenced in a GitHub commit, addresses the missing deduplication in the v1 handler, but the continued reliance on it in billing configurations presents an ongoing threat until all legacy configurations are updated.

What This Means For You

  • Security teams managing WWBN AVideo instances should immediately audit all active billing plans and payment configurations to ensure they are not utilizing the deprecated `plugin/PayPalYPT/ipn.php` handler; prioritize migrating any such plans to the newer, secured IPN v2 or webhook handlers to prevent transaction replay exploits.

Related ATT&CK Techniques

Indicators of Compromise

IDTypeIndicator
CVE-2026-39366 Deserialization WWBN AVideo versions 26.0 and prior, plugin/PayPalYPT/ipn.php, lacks transaction deduplication, allowing replay of IPN notifications.
CVE-2026-39366 Misconfiguration WWBN AVideo versions 26.0 and prior, PayPal IPN v1 handler (ipn.php) is referenced as notify_url for billing plans, leading to potential financial inflation.
πŸ›‘οΈ
Want the IOCs from this threat? Get structured IOC exports and weekly threat briefs β€” delivered instantly to your Telegram.
Get My Intel β†’

Found this interesting? Follow us to stay ahead.

Telegram Channel Follow Shimi Cohen Follow Shimi's Cyber World
Share
Telegram LinkedIn WhatsApp Reddit