Wowza Vulnerabilities
Comprehensive security vulnerability database for Wowza products
4
0
1
4
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2016-20036 | 5.1 | An attacker can inject harmful scripts into the Wowza Streaming Engine's management interface, allowing them to execute malicious code in a user's browser session. This vulnerability requires the attacker to manipulate specific input parameters, potentially tricking users into clicking on a link or visiting a page that exploits the flaw. | wowzastreaming engine | Theoretical | 22 days agoMar 16, 2026 |
| CVE-2016-20035 | 6.9 | This vulnerability allows attackers to create new admin accounts with any credentials by tricking logged-in administrators into visiting a malicious website. The attacker needs the administrator to be logged in to the Wowza Streaming Engine while visiting the malicious site, which then submits unauthorized requests on their behalf. | wowzastreaming engine | Exploit Available | 22 days agoMar 16, 2026 |
| CVE-2016-20034 | 8.7 | This vulnerability allows an attacker with a read-only user account to gain full administrative access to the Wowza Streaming Engine by tricking the system into thinking they have higher privileges. The attacker simply needs to send a specially crafted request to the server, changing certain parameters to elevate their access level. | wowzastreaming engine | Theoretical | 22 days agoMar 16, 2026 |
| CVE-2016-20033 | 8.5 | This vulnerability allows an attacker with access to the Wowza Streaming Engine to replace important executable files with malicious ones, giving them the ability to run code with full system privileges when the services restart. The attacker can exploit this due to overly permissive file settings that let anyone modify these files. | wowzastreaming engine | Theoretical | 22 days agoMar 16, 2026 |
About Wowza Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Wowza products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.