CVE-2026-33648

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the restreamer endpoint constructs a log file path by embedding user-controlled `users_id` and `liveTransmitionHistory_id` values from the JSON request body without any sanitization. This log file path is then concatenated directly into shell commands passed to `exec()`, allowing an authenticated user to achieve arbitrary command execution on the server via shell metacharacters such as `$()` or backticks. Commit 99b865413172045fef6a98b5e9bfc7b24da11678 contains a patch.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

History

25 Mar 2026, 17:55

Type Values Removed Values Added
CPE cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*
References () https://github.com/WWBN/AVideo/commit/99b865413172045fef6a98b5e9bfc7b24da11678 - () https://github.com/WWBN/AVideo/commit/99b865413172045fef6a98b5e9bfc7b24da11678 - Patch
References () https://github.com/WWBN/AVideo/security/advisories/GHSA-5m4q-5cvx-36mw - () https://github.com/WWBN/AVideo/security/advisories/GHSA-5m4q-5cvx-36mw - Exploit, Vendor Advisory
Summary
  • (es) WWBN AVideo es una plataforma de video de código abierto. En versiones hasta la 26.0 inclusive, el endpoint del restreamer construye una ruta de archivo de registro incrustando valores controlados por el usuario `users_id` y `liveTransmitionHistory_id` del cuerpo de la solicitud JSON sin ninguna sanitización. Esta ruta de archivo de registro se concatena luego directamente en comandos de shell pasados a `exec()`, permitiendo a un usuario autenticado lograr la ejecución arbitraria de comandos en el servidor a través de metacaracteres de shell como `$()` o comillas invertidas. El commit 99b865413172045fef6a98b5e9bfc7b24da11678 contiene un parche.
First Time Wwbn
Wwbn avideo

23 Mar 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-23 19:16

Updated : 2026-03-25 17:55


NVD link : CVE-2026-33648

Mitre link : CVE-2026-33648

CVE.ORG link : CVE-2026-33648


JSON object : View

Products Affected

wwbn

  • avideo
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')