CVE-2026-33478: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in WWBN AVideo
CVE-2026-33478 is a critical remote code execution vulnerability in WWBN AVideo versions up to 26. 0. It involves a chain of flaws in the CloneSite plugin that allows unauthenticated attackers to access secret keys, dump the database including weakly hashed admin passwords, and ultimately execute arbitrary OS commands via an injection in the rsync command. The vulnerability requires no authentication or user interaction and affects confidentiality, integrity, and availability severely. A patch is available in commit c85d076375fab095a14170df7ddb27058134d38c. Organizations using AVideo should urgently update to a fixed version to prevent exploitation. The CVSS score is 10. 0, reflecting the critical nature of this flaw.
AI Analysis
Technical Summary
WWBN AVideo, an open-source video platform, suffers from a critical vulnerability (CVE-2026-33478) in its CloneSite plugin up to version 26.0. The vulnerability chain begins with the `clones.json.php` endpoint exposing clone secret keys without any authentication, allowing attackers to retrieve sensitive credentials. Using these keys, attackers can invoke the `cloneServer.json.php` endpoint to perform a full database dump, which contains admin password hashes stored using MD5, a weak hashing algorithm susceptible to trivial cracking. Once admin credentials are compromised, attackers exploit an OS command injection vulnerability in the `cloneClient.json.php` endpoint. This injection occurs during the construction of an rsync command, enabling arbitrary system command execution on the server. The vulnerability requires no privileges or user interaction, making it highly exploitable remotely. The flaw impacts confidentiality (database and credentials exposure), integrity (unauthorized command execution), and availability (potential system compromise). A patch addressing this issue is available in commit c85d076375fab095a14170df7ddb27058134d38c. The CVSS v3.1 score is 10.0, indicating a critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and scope change.
Potential Impact
This vulnerability allows attackers to fully compromise affected AVideo servers remotely without authentication. The exposure of clone secret keys and subsequent database dumps leaks sensitive data, including admin credentials hashed with MD5, which can be cracked easily. With admin access, attackers can execute arbitrary OS commands, potentially leading to full system takeover, data theft, service disruption, or use of the server as a pivot point for further attacks. Organizations relying on AVideo for video hosting or streaming risk severe confidentiality breaches, loss of data integrity, and denial of service. The critical nature of this flaw means exploitation could result in significant operational and reputational damage, especially for entities hosting sensitive or proprietary video content.
Mitigation Recommendations
Organizations should immediately apply the patch referenced in commit c85d076375fab095a14170df7ddb27058134d38c or upgrade to a version beyond 26.0 where this vulnerability is fixed. Until patched, restrict network access to the affected endpoints (`clones.json.php`, `cloneServer.json.php`, and `cloneClient.json.php`) using firewalls or web application firewalls (WAFs) to limit exposure. Implement strict access controls and monitor logs for unusual activity related to these endpoints. Replace MD5 password hashes with a strong, modern hashing algorithm (e.g., bcrypt, Argon2) to prevent trivial cracking if database dumps occur. Conduct regular security audits of plugins and third-party components. Employ intrusion detection systems to detect command injection attempts and anomalous rsync usage. Finally, educate administrators on the risks of using outdated software and the importance of timely patching.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Japan, South Korea, India, Brazil
CVE-2026-33478: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in WWBN AVideo
Description
CVE-2026-33478 is a critical remote code execution vulnerability in WWBN AVideo versions up to 26. 0. It involves a chain of flaws in the CloneSite plugin that allows unauthenticated attackers to access secret keys, dump the database including weakly hashed admin passwords, and ultimately execute arbitrary OS commands via an injection in the rsync command. The vulnerability requires no authentication or user interaction and affects confidentiality, integrity, and availability severely. A patch is available in commit c85d076375fab095a14170df7ddb27058134d38c. Organizations using AVideo should urgently update to a fixed version to prevent exploitation. The CVSS score is 10. 0, reflecting the critical nature of this flaw.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
WWBN AVideo, an open-source video platform, suffers from a critical vulnerability (CVE-2026-33478) in its CloneSite plugin up to version 26.0. The vulnerability chain begins with the `clones.json.php` endpoint exposing clone secret keys without any authentication, allowing attackers to retrieve sensitive credentials. Using these keys, attackers can invoke the `cloneServer.json.php` endpoint to perform a full database dump, which contains admin password hashes stored using MD5, a weak hashing algorithm susceptible to trivial cracking. Once admin credentials are compromised, attackers exploit an OS command injection vulnerability in the `cloneClient.json.php` endpoint. This injection occurs during the construction of an rsync command, enabling arbitrary system command execution on the server. The vulnerability requires no privileges or user interaction, making it highly exploitable remotely. The flaw impacts confidentiality (database and credentials exposure), integrity (unauthorized command execution), and availability (potential system compromise). A patch addressing this issue is available in commit c85d076375fab095a14170df7ddb27058134d38c. The CVSS v3.1 score is 10.0, indicating a critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and scope change.
Potential Impact
This vulnerability allows attackers to fully compromise affected AVideo servers remotely without authentication. The exposure of clone secret keys and subsequent database dumps leaks sensitive data, including admin credentials hashed with MD5, which can be cracked easily. With admin access, attackers can execute arbitrary OS commands, potentially leading to full system takeover, data theft, service disruption, or use of the server as a pivot point for further attacks. Organizations relying on AVideo for video hosting or streaming risk severe confidentiality breaches, loss of data integrity, and denial of service. The critical nature of this flaw means exploitation could result in significant operational and reputational damage, especially for entities hosting sensitive or proprietary video content.
Mitigation Recommendations
Organizations should immediately apply the patch referenced in commit c85d076375fab095a14170df7ddb27058134d38c or upgrade to a version beyond 26.0 where this vulnerability is fixed. Until patched, restrict network access to the affected endpoints (`clones.json.php`, `cloneServer.json.php`, and `cloneClient.json.php`) using firewalls or web application firewalls (WAFs) to limit exposure. Implement strict access controls and monitor logs for unusual activity related to these endpoints. Replace MD5 password hashes with a strong, modern hashing algorithm (e.g., bcrypt, Argon2) to prevent trivial cracking if database dumps occur. Conduct regular security audits of plugins and third-party components. Employ intrusion detection systems to detect command injection attempts and anomalous rsync usage. Finally, educate administrators on the risks of using outdated software and the importance of timely patching.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-20T16:16:48.970Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c14e9ef4197a8e3b641c82
Added to database: 3/23/2026, 2:30:54 PM
Last enriched: 3/30/2026, 8:49:45 PM
Last updated: 5/7/2026, 4:29:42 AM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.