Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33354: CWE-73: External Control of File Name or Path in WWBN AVideo

0
High
VulnerabilityCVE-2026-33354cvecve-2026-33354cwe-73
Published: Mon Mar 23 2026 (03/23/2026, 13:58:13 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, `POST /objects/aVideoEncoder.json.php` accepts a requester-controlled `chunkFile` parameter intended for staged upload chunks. Instead of restricting that path to trusted server-generated chunk locations, the endpoint accepts arbitrary local filesystem paths that pass `isValidURLOrPath()`. That helper allows files under broad server directories including `/var/www/`, the application root, cache, tmp, and `videos`, only rejecting `.php` files. For an authenticated uploader editing their own video, this becomes an arbitrary local file read. The endpoint copies the attacker-chosen local file into the attacker's public video storage path, after which it can be downloaded over HTTP. Commit 59bbd601a3f65a5b18c1d9e4eb11471c0a59214f contains a patch for the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:20:44 UTC

Technical Analysis

WWBN AVideo is an open-source video platform that, in versions up to and including 26.0, contains a vulnerability identified as CVE-2026-33354, categorized under CWE-73 (External Control of File Name or Path). The vulnerability exists in the `POST /objects/aVideoEncoder.json.php` endpoint, which accepts a `chunkFile` parameter intended for uploading video chunks in stages. Instead of restricting this parameter to server-generated chunk file locations, the application accepts arbitrary local filesystem paths that pass the `isValidURLOrPath()` validation. This validation is insufficiently restrictive, allowing paths under broad server directories such as `/var/www/`, the application root, cache, tmp, and `videos` directories, while only excluding files with a `.php` extension. An authenticated user with uploader privileges can exploit this flaw to read arbitrary local files by specifying their paths in the `chunkFile` parameter. The endpoint then copies the chosen local file into the attacker's public video storage directory, making the file accessible for download over HTTP. This results in an arbitrary local file read vulnerability, potentially exposing sensitive server files. The vulnerability requires authentication but no additional user interaction. The patch addressing this issue was committed in commit 59bbd601a3f65a5b18c1d9e4eb11471c0a59214f. The CVSS v3.1 score is 7.6, reflecting a high-severity issue with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality (high), integrity (low), and availability (low). No known exploits are currently reported in the wild.

Potential Impact

The primary impact of CVE-2026-33354 is the unauthorized disclosure of sensitive local files on the server hosting the WWBN AVideo platform. Attackers who gain authenticated uploader access can read arbitrary files within broad server directories, potentially exposing configuration files, credentials, logs, or other sensitive data. This can lead to further compromise, including privilege escalation, lateral movement, or data leakage. The ability to copy files into publicly accessible video storage paths exacerbates the risk by making sensitive data accessible over HTTP to any external party. Although the vulnerability does not allow execution of arbitrary code or direct modification of files, the confidentiality breach alone can have severe consequences for organizations relying on AVideo for media hosting, especially if sensitive internal files are exposed. The requirement for authentication limits the attack surface but does not eliminate risk, as attackers may obtain credentials through phishing, credential stuffing, or insider threats. The vulnerability affects availability and integrity to a lesser extent, as it primarily involves file reading and copying rather than deletion or modification.

Mitigation Recommendations

Organizations using WWBN AVideo should immediately upgrade to a version that includes the patch for CVE-2026-33354, as indicated by commit 59bbd601a3f65a5b18c1d9e4eb11471c0a59214f or later releases. Until patching is possible, administrators should restrict uploader privileges strictly to trusted users and monitor upload activity for suspicious use of the `chunkFile` parameter. Implementing web application firewall (WAF) rules to detect and block requests attempting to specify unusual or sensitive file paths in the `chunkFile` parameter can provide temporary mitigation. Additionally, server-side hardening should be applied by restricting file system permissions to limit access to sensitive directories from the application user context. Logging and alerting on anomalous file access patterns related to video uploads can help detect exploitation attempts. Finally, reviewing and tightening the validation logic for file paths in upload endpoints to enforce strict whitelisting of allowed directories and file types is critical to prevent similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-18T22:15:11.814Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c14e9ef4197a8e3b641c7e

Added to database: 3/23/2026, 2:30:54 PM

Last enriched: 3/30/2026, 8:20:44 PM

Last updated: 4/30/2026, 11:36:45 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses