Vulnerability Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `downloadVideoFromDownloadURL()` function in `objects/aVideoEncoder.json.php` saves remote content to a web-accessible temporary directory using the original URL's filename and extension (including `.php`). By providing an invalid `resolution` parameter, an attacker triggers an early `die()` via `forbiddenPage()` before the temp file can be moved or cleaned up, leaving an executable PHP file persistently accessible under the web root at `videos/cache/tmpFile/`. Commit 6da79b43484099a0b660d1544a63c07b633ed3a2 contains a patch.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wwbn | Avideo | <= 26.0 |
Related Weaknesses (CWE)
References
- https://github.com/WWBN/AVideo/commit/6da79b43484099a0b660d1544a63c07b633ed3a2Patch
- https://github.com/WWBN/AVideo/security/advisories/GHSA-8wf4-c4x3-h952ExploitVendor Advisory
FAQ
What is CVE-2026-33717?
CVE-2026-33717 is a vulnerability with a CVSS score of 8.8 (HIGH). WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `downloadVideoFromDownloadURL()` function in `objects/aVideoEncoder.json.php` saves remote content to a web-acce...
How severe is CVE-2026-33717?
CVE-2026-33717 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33717?
Check the references section above for vendor advisories and patch information. Affected products include: Wwbn Avideo.