CVE-2026-33479

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the Gallery plugin's `saveSort.json.php` endpoint passes unsanitized user input from `$_REQUEST['sections']` array values directly into PHP's `eval()` function. While the endpoint is gated behind `User::isAdmin()`, it has no CSRF token validation. Combined with AVideo's explicit `SameSite=None` session cookie configuration, an attacker can exploit this via cross-site request forgery to achieve unauthenticated remote code execution — requiring only that an admin visits an attacker-controlled page. Commit 087dab8841f8bdb54be184105ef19b47c5698fcb contains a patch.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

History

24 Mar 2026, 18:48

Type Values Removed Values Added
References () https://github.com/WWBN/AVideo/commit/087dab8841f8bdb54be184105ef19b47c5698fcb - () https://github.com/WWBN/AVideo/commit/087dab8841f8bdb54be184105ef19b47c5698fcb - Patch
References () https://github.com/WWBN/AVideo/security/advisories/GHSA-xggw-g9pm-9qhh - () https://github.com/WWBN/AVideo/security/advisories/GHSA-xggw-g9pm-9qhh - Exploit, Mitigation, Vendor Advisory
First Time Wwbn
Wwbn avideo
CPE cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

24 Mar 2026, 15:54

Type Values Removed Values Added
Summary
  • (es) WWBN AVideo es una plataforma de video de código abierto. En versiones hasta la 26.0 inclusive, el plugin Gallery, en su endpoint 'saveSort.json.php', pasa entrada de usuario no saneada de los valores del array '$_REQUEST['sections']' directamente a la función 'eval()' de PHP. Aunque el endpoint está protegido por `User::isAdmin()`, no tiene validación de token CSRF. Combinado con la configuración explícita de la cookie de sesión `SameSite=None` de AVideo, un atacante puede explotar esto mediante falsificación de petición en sitios cruzados para lograr ejecución remota de código no autenticada — requiriendo solo que un administrador visite una página controlada por el atacante. El commit 087dab8841f8bdb54be184105ef19b47c5698fcb contiene un parche.

23 Mar 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-23 15:16

Updated : 2026-03-24 18:48


NVD link : CVE-2026-33479

Mitre link : CVE-2026-33479

CVE.ORG link : CVE-2026-33479


JSON object : View

Products Affected

wwbn

  • avideo
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')