Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33352: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in WWBN AVideo

0
Critical
VulnerabilityCVE-2026-33352cvecve-2026-33352cwe-89
Published: Mon Mar 23 2026 (03/23/2026, 13:53:47 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-33352 is a critical SQL injection vulnerability in WWBN AVideo versions prior to 26. 0. It exists in the getAllCategories() method within objects/category. php, where the doNotShowCats parameter is improperly sanitized by only removing single quotes, allowing bypass via backslash escaping. This flaw enables unauthenticated attackers to execute arbitrary SQL commands, potentially leading to full database compromise including data confidentiality, integrity, and availability. The vulnerability has a CVSS score of 9. 8, indicating critical severity with no authentication or user interaction required. Although no known exploits are reported in the wild yet, the risk is high due to the ease of exploitation and impact. WWBN released version 26. 0 to patch this issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 14:16:17 UTC

Technical Analysis

CVE-2026-33352 is a critical SQL injection vulnerability affecting WWBN AVideo, an open-source video platform, in versions prior to 26.0. The vulnerability resides in the getAllCategories() method of the objects/category.php file, specifically in the handling of the doNotShowCats request parameter. The application attempts to sanitize this parameter by stripping single-quote characters using str_replace("'", '', ...), but this approach is insufficient and can be trivially bypassed using a backslash escape technique to manipulate SQL string boundaries. Notably, this parameter is not subjected to the application's global input filters defined in objects/security.php, leaving it vulnerable to injection attacks. An unauthenticated attacker can exploit this flaw remotely without any user interaction, injecting malicious SQL commands that can lead to unauthorized data access, modification, or deletion. The vulnerability impacts confidentiality, integrity, and availability of the backend database. WWBN addressed this issue in version 26.0 by implementing proper input validation and sanitization. The CVSS v3.1 score of 9.8 reflects the critical nature of this vulnerability, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits have been reported yet, but the straightforward bypass technique and lack of authentication make this a high-risk vulnerability for affected deployments.

Potential Impact

The impact of CVE-2026-33352 is severe for organizations using vulnerable versions of WWBN AVideo. Exploitation allows unauthenticated remote attackers to execute arbitrary SQL commands against the backend database, potentially leading to full compromise of stored data. This includes unauthorized disclosure of sensitive user information, modification or deletion of video content metadata, and disruption of service availability through destructive queries. Given that AVideo is a video platform, compromised data integrity could undermine content trustworthiness, while confidentiality breaches could expose user identities and viewing habits. The availability impact could result in denial of service, affecting business continuity and user experience. Organizations relying on AVideo for content delivery or user engagement may face reputational damage, regulatory penalties for data breaches, and operational disruptions. The ease of exploitation and critical severity score underscore the urgent need for remediation to prevent potential large-scale attacks.

Mitigation Recommendations

To mitigate CVE-2026-33352, organizations should immediately upgrade WWBN AVideo to version 26.0 or later, where the vulnerability is patched. If upgrading is not immediately feasible, apply strict input validation and sanitization on the doNotShowCats parameter, ensuring that all special characters are properly escaped or parameterized queries are used to prevent SQL injection. Employ prepared statements with bound parameters for all database queries involving user input. Review and enforce global input filtering mechanisms to cover all parameters, including those previously excluded like doNotShowCats. Implement Web Application Firewalls (WAFs) with SQL injection detection rules tailored to catch backslash escape bypass techniques. Conduct thorough code audits to identify and remediate similar injection points. Monitor application logs for suspicious query patterns indicative of injection attempts. Finally, educate developers on secure coding practices to avoid improper input sanitization and ensure comprehensive security testing before deployment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T22:15:11.814Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c14797f4197a8e3b602ab3

Added to database: 3/23/2026, 2:00:55 PM

Last enriched: 3/23/2026, 2:16:17 PM

Last updated: 3/23/2026, 3:28:16 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses