Vulnerability Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, multiple vulnerabilities in AVideo's CloneSite plugin chain together to allow a completely unauthenticated attacker to achieve remote code execution. The `clones.json.php` endpoint exposes clone secret keys without authentication, which can be used to trigger a full database dump via `cloneServer.json.php`. The dump contains admin password hashes stored as MD5, which are trivially crackable. With admin access, the attacker exploits an OS command injection in the rsync command construction in `cloneClient.json.php` to execute arbitrary system commands. Commit c85d076375fab095a14170df7ddb27058134d38c contains a patch.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wwbn | Avideo | <= 26.0 |
Related Weaknesses (CWE)
References
- https://github.com/WWBN/AVideo/commit/c85d076375fab095a14170df7ddb27058134d38cPatch
- https://github.com/WWBN/AVideo/security/advisories/GHSA-687q-32c6-8x68ExploitMitigationVendor Advisory
- https://github.com/WWBN/AVideo/security/advisories/GHSA-687q-32c6-8x68ExploitMitigationVendor Advisory
FAQ
What is CVE-2026-33478?
CVE-2026-33478 is a vulnerability with a CVSS score of 10.0 (CRITICAL). WWBN AVideo is an open source video platform. In versions up to and including 26.0, multiple vulnerabilities in AVideo's CloneSite plugin chain together to allow a completely unauthenticated attacker ...
How severe is CVE-2026-33478?
CVE-2026-33478 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-33478?
Check the references section above for vendor advisories and patch information. Affected products include: Wwbn Avideo.