Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33293: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WWBN AVideo

0
High
VulnerabilityCVE-2026-33293cvecve-2026-33293cwe-22
Published: Sun Mar 22 2026 (03/22/2026, 16:35:16 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

WWBN AVideo is an open source video platform. Prior to version 26.0, the `deleteDump` parameter in `plugin/CloneSite/cloneServer.json.php` is passed directly to `unlink()` without any path sanitization. An attacker with valid clone credentials can use path traversal sequences (e.g., `../../`) to delete arbitrary files on the server, including critical application files such as `configuration.php`, causing complete denial of service or enabling further attacks by removing security-critical files. Version 26.0 fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/29/2026, 19:54:33 UTC

Technical Analysis

CVE-2026-33293 is a path traversal vulnerability categorized under CWE-22 affecting WWBN AVideo, an open-source video platform. The vulnerability arises because the deleteDump parameter in the plugin/CloneSite/cloneServer.json.php script is directly passed to the PHP unlink() function without any path sanitization or validation. This allows an authenticated attacker with clone credentials to craft path traversal sequences (e.g., ../../) to delete arbitrary files on the server filesystem. Critical files such as configuration.php can be targeted, potentially causing a complete denial of service by breaking the application or enabling further exploitation by removing security-critical files. The vulnerability affects all versions prior to 26.0, where proper input validation and sanitization have been implemented to mitigate this risk. The CVSS v3.1 score is 8.1, reflecting high severity due to the ease of exploitation (low complexity), the requirement for privileges (authenticated clone user), and the significant impact on integrity and availability. No user interaction is required beyond authentication. No known exploits are currently reported in the wild, but the vulnerability poses a serious risk to affected deployments.

Potential Impact

The impact of this vulnerability is significant for organizations running WWBN AVideo versions prior to 26.0. An attacker with valid clone credentials can delete arbitrary files, including critical configuration and application files, leading to complete denial of service. This disrupts video platform availability and can cause loss of data integrity. Additionally, by deleting security-critical files, attackers may create conditions for further exploitation or persistent compromise. Organizations relying on AVideo for content delivery, especially those with sensitive or business-critical video content, face operational disruptions and potential reputational damage. The requirement for valid clone credentials limits exploitation to insiders or compromised accounts, but the impact remains high due to the destructive nature of the attack.

Mitigation Recommendations

1. Upgrade all WWBN AVideo instances to version 26.0 or later, where the vulnerability is patched. 2. Restrict clone credentials strictly to trusted administrators and monitor their usage closely. 3. Implement additional access controls and logging around cloneServer.json.php usage to detect suspicious deletion attempts. 4. Employ file system permissions to limit the unlink() function's ability to delete critical files outside intended directories. 5. Conduct regular backups of configuration and critical files to enable rapid recovery in case of deletion. 6. Use Web Application Firewalls (WAFs) with custom rules to detect and block path traversal patterns in requests to cloneServer.json.php. 7. Perform periodic security audits and penetration testing focusing on authenticated user actions to detect similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T18:55:47.426Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c02043f4197a8e3ba1f6e2

Added to database: 3/22/2026, 5:00:51 PM

Last enriched: 3/29/2026, 7:54:33 PM

Last updated: 5/7/2026, 4:27:22 AM

Views: 93

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses