CVE-2022-32769

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-32769
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-32769.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-32769
Published
2022-08-22T19:15:10.413Z
Modified
2025-11-20T12:07:42.357432Z
Severity
  • 5.0 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
[none]
Details

Multiple authentication bypass vulnerabilities exist in the objects id handling functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request by an authenticated user can lead to unauthorized access and takeover of resources. An attacker can send an HTTP request to trigger this vulnerability.This vulnerability exists in the Playlists plugin, allowing an attacker to bypass authentication by guessing a sequential ID, allowing them to take over the another user's playlists.

References

Affected packages

Git / github.com/wwbn/avideo

Affected ranges

Type
GIT
Repo
https://github.com/wwbn/avideo
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

10.*

10.4
10.8

Other

11

11.*

11.1
11.1.1
11.5
11.6

2.*

2.2
2.4
2.7

3.*

3.4
3.4.1

4.*

4.0
4.0.1
4.0.2

5.*

5.0

6.*

6.5

7.*

7.2
7.3
7.4
7.5
7.6
7.7
7.8

8.*

8.1
8.5
8.6
8.7
8.9
8.9.1

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-32769.json"