CVE-2026-33651

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `remindMe.json.php` endpoint passes `$_REQUEST['live_schedule_id']` through multiple functions without sanitization until it reaches `Scheduler_commands::getAllActiveOrToRepeat()`, which directly concatenates it into a SQL `LIKE` clause. Although intermediate functions (`new Live_schedule()`, `getUsers_idOrCompany()`) apply `intval()` internally, they do so on local copies within `ObjectYPT::getFromDb()`, leaving the original tainted variable unchanged. Any authenticated user can perform time-based blind SQL injection to extract arbitrary database contents. Commit 75d45780728294ededa1e3f842f95295d3e7d144 contains a patch.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

History

25 Mar 2026, 18:02

Type Values Removed Values Added
CPE cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*
References () https://github.com/WWBN/AVideo/commit/75d45780728294ededa1e3f842f95295d3e7d144 - () https://github.com/WWBN/AVideo/commit/75d45780728294ededa1e3f842f95295d3e7d144 - Patch
References () https://github.com/WWBN/AVideo/security/advisories/GHSA-pvw4-p2jm-chjm - () https://github.com/WWBN/AVideo/security/advisories/GHSA-pvw4-p2jm-chjm - Exploit, Vendor Advisory
Summary
  • (es) WWBN AVideo es una plataforma de video de código abierto. En versiones hasta la 26.0 inclusive, el endpoint 'remindMe.json.php' pasa '$_REQUEST['live_schedule_id']' a través de múltiples funciones sin sanitización hasta que llega a 'Scheduler_commands::getAllActiveOrToRepeat()', que lo concatena directamente en una cláusula SQL 'LIKE'. Aunque las funciones intermedias ('new Live_schedule()', 'getUsers_idOrCompany()') aplican 'intval()' internamente, lo hacen en copias locales dentro de 'ObjectYPT::getFromDb()', dejando la variable original contaminada sin cambios. Cualquier usuario autenticado puede realizar una inyección SQL ciega basada en tiempo para extraer contenido arbitrario de la base de datos. El commit 75d45780728294ededa1e3f842f95295d3e7d144 contiene un parche.
First Time Wwbn
Wwbn avideo

23 Mar 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-23 19:16

Updated : 2026-03-25 18:02


NVD link : CVE-2026-33651

Mitre link : CVE-2026-33651

CVE.ORG link : CVE-2026-33651


JSON object : View

Products Affected

wwbn

  • avideo
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')