CVE-2020-37173
Published: 11 February 2026
Summary
CVE-2020-37173 is a high-severity Exposure of Private Personal Information to an Unauthorized Actor (CWE-359) vulnerability in Wwbn Avideo. Its CVSS base score is 7.5 (High).
Operationally, ranked at the 33.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Automated marking identifies private personal information in outputs, tangibly reducing the ability to exploit weaknesses that result in its unauthorized exposure.
Privacy-specific attributes and their controlled association directly reduce exposure of private personal information through missing or incorrect labeling.
Preventing nonpublic personal information from public posting reduces unauthorized exposure of private personal data.
The control detects and protects against mining of private personal information, reducing unauthorized exposure of PII.
Privacy literacy training directly targets preventing exposure of personal information through user mishandling.
Tracking locations of sensitive data and access users reduces risk of private personal information exposure.
PIA explicitly identifies PII collection/use/disclosure flows and drives mitigations that reduce the likelihood of unauthorized exposure of private personal information.
The control specifically requires architectures that minimize privacy risk when processing PII, directly addressing exposure of personal information.
NVD Description
AVideo Platform 8.1 contains an information disclosure vulnerability that allows attackers to enumerate user details through the playlistsFromUser.json.php endpoint. Attackers can retrieve sensitive user information including email, password hash, and administrative status by manipulating the users_id parameter.
Deeper analysisAI
CVE-2020-37173 is an information disclosure vulnerability affecting AVideo Platform version 8.1. The issue exists in the playlistsFromUser.json.php endpoint, which permits attackers to enumerate sensitive user details by manipulating the users_id parameter. Exposed information includes email addresses, password hashes, and administrative status, classified under CWE-359 (Exposure of Private Information to an Unauthorized Actor).
Remote unauthenticated attackers can exploit this vulnerability with low complexity and no user interaction, as indicated by its CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). Exploitation allows retrieval of high-impact confidential user data across the network, potentially enabling follow-on attacks such as password cracking or impersonation of administrators.
Advisories and additional resources are available at https://avideo.com, https://github.com/WWBN/AVideo, https://www.exploit-db.com/exploits/47997, and https://www.vulncheck.com/advisories/avideo-platform-information-disclosure-user-enumeration, which security practitioners should review for mitigation recommendations and any available patches.
Details
- CWE(s)