Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28502: CWE-434: Unrestricted Upload of File with Dangerous Type in WWBN AVideo

0
Critical
VulnerabilityCVE-2026-28502cvecve-2026-28502cwe-434
Published: Fri Mar 06 2026 (03/06/2026, 03:04:57 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

WWBN AVideo is an open source video platform. Prior to version 24.0, an authenticated Remote Code Execution (RCE) vulnerability was identified in AVideo related to the plugin upload/import functionality. The issue allowed an authenticated administrator to upload a specially crafted ZIP archive containing executable server-side files. Due to insufficient validation of extracted file contents, the archive was extracted directly into a web-accessible plugin directory, allowing arbitrary PHP code execution. This issue has been patched in version 24.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 03:45:52 UTC

Technical Analysis

CVE-2026-28502 is a critical vulnerability identified in WWBN AVideo, an open-source video platform, affecting all versions prior to 24.0. The flaw is categorized under CWE-434, which involves unrestricted upload of files with dangerous types. Specifically, the vulnerability exists in the plugin upload/import functionality, where an authenticated administrator can upload a specially crafted ZIP archive containing executable server-side files, such as PHP scripts. Due to inadequate validation and sanitization of the extracted files, the archive is unpacked directly into a web-accessible plugin directory. This allows the attacker to execute arbitrary PHP code remotely on the server, leading to Remote Code Execution (RCE). The vulnerability does not require elevated privileges beyond administrator authentication and does not require additional user interaction. The CVSS 4.0 base score is 9.3, indicating critical severity with network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild yet, the nature of the vulnerability makes it highly exploitable in compromised administrative environments. The vendor has addressed this issue in version 24.0 by implementing proper validation and restrictions on uploaded plugin files to prevent execution of unauthorized code.

Potential Impact

The impact of CVE-2026-28502 is severe for organizations using WWBN AVideo versions prior to 24.0. Successful exploitation leads to full Remote Code Execution on the affected server, allowing attackers to execute arbitrary commands, deploy malware, steal sensitive data, or pivot within the network. This compromises confidentiality, integrity, and availability of the video platform and potentially other connected systems. Given that AVideo is used for video content management and streaming, attackers could disrupt service availability, deface content, or exfiltrate user data. The requirement for administrator authentication limits the attack surface but insider threats or compromised admin credentials could enable exploitation. Organizations relying on AVideo for critical video delivery or internal communications are at risk of operational disruption, reputational damage, and regulatory non-compliance if exploited.

Mitigation Recommendations

To mitigate CVE-2026-28502, organizations should immediately upgrade WWBN AVideo to version 24.0 or later, where the vulnerability is patched. Until upgrade is possible, restrict plugin upload permissions strictly to trusted administrators and monitor upload activities for suspicious ZIP archives. Implement additional file validation controls on the server side to detect and block archives containing executable files or unexpected file types. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to access or execute unauthorized PHP files in plugin directories. Regularly audit administrator accounts for compromise and enforce strong authentication mechanisms such as multi-factor authentication (MFA). Isolate the AVideo server in a segmented network zone with limited access to reduce lateral movement risk. Maintain up-to-date backups and incident response plans to quickly recover from potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-27T20:57:47.709Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69aa4a7bc48b3f10ffe32f7e

Added to database: 3/6/2026, 3:31:07 AM

Last enriched: 3/6/2026, 3:45:52 AM

Last updated: 4/20/2026, 6:24:42 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses