CVE-2026-33478

WWBN AVideo is an open source video platform. In versions up to and including 26.0, multiple vulnerabilities in AVideo's CloneSite plugin chain together to allow a completely unauthenticated attacker to achieve remote code execution. The `clones.json.php` endpoint exposes clone secret keys without authentication, which can be used to trigger a full database dump via `cloneServer.json.php`. The dump contains admin password hashes stored as MD5, which are trivially crackable. With admin access, the attacker exploits an OS command injection in the rsync command construction in `cloneClient.json.php` to execute arbitrary system commands. Commit c85d076375fab095a14170df7ddb27058134d38c contains a patch.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

History

24 Mar 2026, 18:51

Type Values Removed Values Added
CPE cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*
First Time Wwbn
Wwbn avideo
References () https://github.com/WWBN/AVideo/commit/c85d076375fab095a14170df7ddb27058134d38c - () https://github.com/WWBN/AVideo/commit/c85d076375fab095a14170df7ddb27058134d38c - Patch
References () https://github.com/WWBN/AVideo/security/advisories/GHSA-687q-32c6-8x68 - () https://github.com/WWBN/AVideo/security/advisories/GHSA-687q-32c6-8x68 - Exploit, Mitigation, Vendor Advisory

24 Mar 2026, 15:54

Type Values Removed Values Added
Summary
  • (es) WWBN AVideo es una plataforma de video de código abierto. En versiones hasta la 26.0 inclusive, múltiples vulnerabilidades en el plugin CloneSite de AVideo se encadenan para permitir a un atacante completamente no autenticado lograr la ejecución remota de código. El endpoint 'clones.json.php' expone claves secretas de clonación sin autenticación, lo que puede usarse para desencadenar un volcado completo de la base de datos a través de 'cloneServer.json.php'. El volcado contiene hashes de contraseñas de administrador almacenados como MD5, que son trivialmente descifrables. Con acceso de administrador, el atacante explota una inyección de comandos del sistema operativo en la construcción del comando rsync en 'cloneClient.json.php' para ejecutar comandos de sistema arbitrarios. El commit c85d076375fab095a14170df7ddb27058134d38c contiene un parche.

23 Mar 2026, 22:16

Type Values Removed Values Added
References () https://github.com/WWBN/AVideo/security/advisories/GHSA-687q-32c6-8x68 - () https://github.com/WWBN/AVideo/security/advisories/GHSA-687q-32c6-8x68 -

23 Mar 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-23 15:16

Updated : 2026-03-24 18:51


NVD link : CVE-2026-33478

Mitre link : CVE-2026-33478

CVE.ORG link : CVE-2026-33478


JSON object : View

Products Affected

wwbn

  • avideo
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-284

Improper Access Control