AVideo's PayPal Handler Vulnerable to Transaction Replay Attacks

AVideo's PayPal Handler Vulnerable to Transaction Replay Attacks

CVE Notify is flagging a critical flaw in the WWBN AVideo open-source video platform, specifically affecting versions 26.0 and earlier. The issue lies within the older PayPal Instant Payment Notification (IPN) v1 handler, located at plugin/PayPalYPT/ipn.php. According to CVE Notify, this handler is missing crucial transaction deduplication logic. This oversight allows attackers to exploit a single, legitimate IPN notification by replaying it multiple times. The consequence? An attacker could artificially inflate their wallet balance or renew subscriptions indefinitely, effectively defrauding the platform.

While newer handlers like ipnV2.php and webhook.php have implemented proper deduplication by referencing PayPalYPT_log entries, the outdated v1 handler remains a significant risk. CVE Notify points out that this vulnerable script is still actively referenced as the notify_url for existing billing plans. This means that even if users aren’t aware of the older handler, systems configured to use it are susceptible to this replay attack.

The vulnerability, tracked as CVE-2026-39366, highlights the persistent danger of maintaining legacy code, especially in payment processing modules. The fix, referenced in a GitHub commit, addresses the missing deduplication in the v1 handler, but the continued reliance on it in billing configurations presents an ongoing threat until all legacy configurations are updated.

What This Means For You

  • Security teams managing WWBN AVideo instances should immediately audit all active billing plans and payment configurations to ensure they are not utilizing the deprecated `plugin/PayPalYPT/ipn.php` handler; prioritize migrating any such plans to the newer, secured IPN v2 or webhook handlers to prevent transaction replay exploits.

Related ATT&CK Techniques

πŸ›‘οΈ Detection Rules

1 rule Β· 6 SIEM formats

1 detection rule mapped to MITRE ATT&CK. Free Sigma YAML below.

high T1190 Initial Access

Web Application Exploitation Attempt β€” CVE-2026-39366

Sigma YAML β€” free preview

Source: Shimi's Cyber World Β· License & reuse

Indicators of Compromise

IDTypeIndicator
CVE-2026-39366 Deserialization WWBN AVideo versions 26.0 and prior, plugin/PayPalYPT/ipn.php, lacks transaction deduplication, allowing replay of IPN notifications.
CVE-2026-39366 Misconfiguration WWBN AVideo versions 26.0 and prior, PayPal IPN v1 handler (ipn.php) is referenced as notify_url for billing plans, leading to potential financial inflation.

Related coverage

npm Boosts Supply Chain Security with 2FA-Gated Staged Publishing

GitHub has rolled out new controls for npm, significantly enhancing software supply chain security. The Hacker News reports that these features, now generally available, introduce...

threat-intelvulnerabilityidentitytools
/SCW Vulnerability Desk /HIGH /⚑ 2 IOCs /⚙ 2 Sigma

Packagist Supply Chain Attack Infects 8 Packages with Linux Malware

A new, coordinated supply chain attack has compromised eight packages on Packagist. The attack injects malicious code designed to retrieve and execute a Linux binary...

threat-intelvulnerabilitymalwaretools
/SCW Vulnerability Desk /HIGH /⚑ 3 IOCs /⚙ 2 Sigma

Laravel-Lang PHP Packages Compromised with Cross-Platform Credential Stealer

The Hacker News reports a significant software supply chain attack targeting multiple PHP packages under the Laravel-Lang project. Attackers compromised these packages to distribute a...

threat-intelvulnerabilitymalwareidentitytools
/SCW Vulnerability Desk /HIGH /⚑ 5 IOCs /⚙ 2 Sigma