CVE-2026-33293: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WWBN AVideo
CVE-2026-33293 is a high-severity path traversal vulnerability in WWBN AVideo versions prior to 26. 0. It arises from improper sanitization of the deleteDump parameter in the cloneServer. json. php script, allowing authenticated users with clone credentials to delete arbitrary files on the server. Exploitation can lead to deletion of critical files such as configuration. php, resulting in denial of service or enabling further attacks. The vulnerability requires valid credentials but no user interaction beyond that. Version 26. 0 of AVideo addresses this issue by implementing proper path validation.
AI Analysis
Technical Summary
WWBN AVideo, an open-source video platform, contains a path traversal vulnerability identified as CVE-2026-33293 (CWE-22) affecting versions prior to 26.0. The vulnerability exists in the plugin/CloneSite/cloneServer.json.php file, specifically in the handling of the deleteDump parameter. This parameter is passed directly to the PHP unlink() function without any path sanitization or validation, allowing an attacker with valid clone credentials to craft path traversal sequences (e.g., ../../) to delete arbitrary files on the server filesystem. Such arbitrary file deletion can target critical application files like configuration.php, which may cause complete denial of service by breaking application functionality or facilitate further attacks by removing security-critical files. The vulnerability requires authentication with clone privileges but does not require additional user interaction. The CVSS 3.1 base score is 8.1, reflecting high severity due to the ease of exploitation (low attack complexity), the requirement of privileges (PR:L), and the significant impact on integrity and availability (I:H, A:H). No known exploits are reported in the wild yet. The issue is fixed in version 26.0 by implementing proper path validation and sanitization to restrict file deletion to intended directories only.
Potential Impact
This vulnerability can have severe consequences for organizations using affected versions of WWBN AVideo. Successful exploitation allows attackers with clone credentials to delete arbitrary files, including critical configuration and application files, leading to complete denial of service. This disrupts video platform availability, potentially impacting business operations, user experience, and service continuity. Furthermore, deletion of security-critical files may weaken the system's security posture, enabling further compromise or privilege escalation. Organizations relying on AVideo for content delivery, especially those with large user bases or critical video infrastructure, face risks of operational downtime and reputational damage. Since the vulnerability requires valid credentials, insider threats or compromised accounts pose significant risks. The lack of user interaction needed makes automated exploitation feasible once credentials are obtained.
Mitigation Recommendations
Organizations should immediately upgrade WWBN AVideo to version 26.0 or later, where the vulnerability is patched with proper path sanitization. Until upgrading, restrict access to clone credentials to trusted personnel only and monitor their usage closely. Implement strict access controls and auditing on the cloneServer.json.php endpoint to detect and prevent unauthorized file deletion attempts. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal patterns in requests targeting the deleteDump parameter. Regularly back up critical configuration and application files to enable rapid recovery in case of deletion. Conduct credential hygiene practices such as multi-factor authentication and regular credential rotation to reduce risk of credential compromise. Finally, perform security assessments and penetration testing focused on file operation endpoints to identify similar vulnerabilities.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Japan, South Korea, India, Brazil
CVE-2026-33293: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WWBN AVideo
Description
CVE-2026-33293 is a high-severity path traversal vulnerability in WWBN AVideo versions prior to 26. 0. It arises from improper sanitization of the deleteDump parameter in the cloneServer. json. php script, allowing authenticated users with clone credentials to delete arbitrary files on the server. Exploitation can lead to deletion of critical files such as configuration. php, resulting in denial of service or enabling further attacks. The vulnerability requires valid credentials but no user interaction beyond that. Version 26. 0 of AVideo addresses this issue by implementing proper path validation.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
WWBN AVideo, an open-source video platform, contains a path traversal vulnerability identified as CVE-2026-33293 (CWE-22) affecting versions prior to 26.0. The vulnerability exists in the plugin/CloneSite/cloneServer.json.php file, specifically in the handling of the deleteDump parameter. This parameter is passed directly to the PHP unlink() function without any path sanitization or validation, allowing an attacker with valid clone credentials to craft path traversal sequences (e.g., ../../) to delete arbitrary files on the server filesystem. Such arbitrary file deletion can target critical application files like configuration.php, which may cause complete denial of service by breaking application functionality or facilitate further attacks by removing security-critical files. The vulnerability requires authentication with clone privileges but does not require additional user interaction. The CVSS 3.1 base score is 8.1, reflecting high severity due to the ease of exploitation (low attack complexity), the requirement of privileges (PR:L), and the significant impact on integrity and availability (I:H, A:H). No known exploits are reported in the wild yet. The issue is fixed in version 26.0 by implementing proper path validation and sanitization to restrict file deletion to intended directories only.
Potential Impact
This vulnerability can have severe consequences for organizations using affected versions of WWBN AVideo. Successful exploitation allows attackers with clone credentials to delete arbitrary files, including critical configuration and application files, leading to complete denial of service. This disrupts video platform availability, potentially impacting business operations, user experience, and service continuity. Furthermore, deletion of security-critical files may weaken the system's security posture, enabling further compromise or privilege escalation. Organizations relying on AVideo for content delivery, especially those with large user bases or critical video infrastructure, face risks of operational downtime and reputational damage. Since the vulnerability requires valid credentials, insider threats or compromised accounts pose significant risks. The lack of user interaction needed makes automated exploitation feasible once credentials are obtained.
Mitigation Recommendations
Organizations should immediately upgrade WWBN AVideo to version 26.0 or later, where the vulnerability is patched with proper path sanitization. Until upgrading, restrict access to clone credentials to trusted personnel only and monitor their usage closely. Implement strict access controls and auditing on the cloneServer.json.php endpoint to detect and prevent unauthorized file deletion attempts. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal patterns in requests targeting the deleteDump parameter. Regularly back up critical configuration and application files to enable rapid recovery in case of deletion. Conduct credential hygiene practices such as multi-factor authentication and regular credential rotation to reduce risk of credential compromise. Finally, perform security assessments and penetration testing focused on file operation endpoints to identify similar vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-18T18:55:47.426Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c02043f4197a8e3ba1f6e2
Added to database: 3/22/2026, 5:00:51 PM
Last enriched: 3/22/2026, 5:15:54 PM
Last updated: 3/22/2026, 6:09:35 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.