Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33478: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in WWBN AVideo

0
Critical
VulnerabilityCVE-2026-33478cvecve-2026-33478cwe-78cwe-284
Published: Mon Mar 23 2026 (03/23/2026, 14:01:19 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-33478 is a critical remote code execution vulnerability in WWBN AVideo versions up to 26. 0. It involves a chain of flaws in the CloneSite plugin that allows unauthenticated attackers to access secret keys, dump the database including weakly hashed admin passwords, and ultimately execute arbitrary OS commands via an injection in the rsync command. The vulnerability requires no authentication or user interaction and affects confidentiality, integrity, and availability severely. A patch is available in commit c85d076375fab095a14170df7ddb27058134d38c. Organizations using AVideo should urgently update to a fixed version to prevent exploitation. The CVSS score is 10. 0, reflecting the critical nature of this flaw.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:49:45 UTC

Technical Analysis

WWBN AVideo, an open-source video platform, suffers from a critical vulnerability (CVE-2026-33478) in its CloneSite plugin up to version 26.0. The vulnerability chain begins with the `clones.json.php` endpoint exposing clone secret keys without any authentication, allowing attackers to retrieve sensitive credentials. Using these keys, attackers can invoke the `cloneServer.json.php` endpoint to perform a full database dump, which contains admin password hashes stored using MD5, a weak hashing algorithm susceptible to trivial cracking. Once admin credentials are compromised, attackers exploit an OS command injection vulnerability in the `cloneClient.json.php` endpoint. This injection occurs during the construction of an rsync command, enabling arbitrary system command execution on the server. The vulnerability requires no privileges or user interaction, making it highly exploitable remotely. The flaw impacts confidentiality (database and credentials exposure), integrity (unauthorized command execution), and availability (potential system compromise). A patch addressing this issue is available in commit c85d076375fab095a14170df7ddb27058134d38c. The CVSS v3.1 score is 10.0, indicating a critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and scope change.

Potential Impact

This vulnerability allows attackers to fully compromise affected AVideo servers remotely without authentication. The exposure of clone secret keys and subsequent database dumps leaks sensitive data, including admin credentials hashed with MD5, which can be cracked easily. With admin access, attackers can execute arbitrary OS commands, potentially leading to full system takeover, data theft, service disruption, or use of the server as a pivot point for further attacks. Organizations relying on AVideo for video hosting or streaming risk severe confidentiality breaches, loss of data integrity, and denial of service. The critical nature of this flaw means exploitation could result in significant operational and reputational damage, especially for entities hosting sensitive or proprietary video content.

Mitigation Recommendations

Organizations should immediately apply the patch referenced in commit c85d076375fab095a14170df7ddb27058134d38c or upgrade to a version beyond 26.0 where this vulnerability is fixed. Until patched, restrict network access to the affected endpoints (`clones.json.php`, `cloneServer.json.php`, and `cloneClient.json.php`) using firewalls or web application firewalls (WAFs) to limit exposure. Implement strict access controls and monitor logs for unusual activity related to these endpoints. Replace MD5 password hashes with a strong, modern hashing algorithm (e.g., bcrypt, Argon2) to prevent trivial cracking if database dumps occur. Conduct regular security audits of plugins and third-party components. Employ intrusion detection systems to detect command injection attempts and anomalous rsync usage. Finally, educate administrators on the risks of using outdated software and the importance of timely patching.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-20T16:16:48.970Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c14e9ef4197a8e3b641c82

Added to database: 3/23/2026, 2:30:54 PM

Last enriched: 3/30/2026, 8:49:45 PM

Last updated: 5/7/2026, 4:29:42 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses