Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33478: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in WWBN AVideo

0
Critical
VulnerabilityCVE-2026-33478cvecve-2026-33478cwe-78cwe-284
Published: Mon Mar 23 2026 (03/23/2026, 14:01:19 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-33478 is a critical unauthenticated remote code execution vulnerability in WWBN AVideo versions up to 26. 0. It arises from multiple chained flaws in the CloneSite plugin, including exposure of clone secret keys via an unauthenticated endpoint, leading to a full database dump containing weakly hashed admin passwords. With admin credentials compromised, attackers can exploit an OS command injection vulnerability in the rsync command construction to execute arbitrary system commands. The vulnerability has a CVSS score of 10, indicating maximum severity with full impact on confidentiality, integrity, and availability without requiring authentication or user interaction. A patch has been committed to address this issue. Organizations using affected versions should urgently update and review their systems to prevent exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 14:47:19 UTC

Technical Analysis

WWBN AVideo, an open-source video platform, suffers from a critical vulnerability (CVE-2026-33478) in its CloneSite plugin up to version 26.0. The vulnerability chain begins with the `clones.json.php` endpoint, which exposes clone secret keys without any authentication. These keys enable attackers to invoke the `cloneServer.json.php` endpoint to perform a full database dump. The dumped database includes admin password hashes stored using MD5, a weak hashing algorithm that can be easily cracked. Once admin credentials are obtained, attackers can access the `cloneClient.json.php` endpoint, where an OS command injection flaw exists in the construction of an rsync command. This injection allows arbitrary system command execution on the server hosting AVideo. The vulnerability is severe because it requires no authentication or user interaction, affects confidentiality (database and credentials exposure), integrity (arbitrary command execution), and availability (potential system compromise). The vulnerability is tracked under CWE-78 (OS Command Injection) and CWE-284 (Improper Access Control). A patch has been committed (commit c85d076375fab095a14170df7ddb27058134d38c) to fix these issues.

Potential Impact

The impact of CVE-2026-33478 is severe and wide-ranging. Attackers can gain full remote code execution on affected AVideo servers without any authentication, leading to complete system compromise. Confidential data, including user information and admin credentials, can be stolen or manipulated. The use of weak MD5 hashes for admin passwords facilitates quick credential cracking, escalating privileges easily. This can result in data breaches, service disruption, defacement, or use of the compromised server as a pivot point for further attacks within an organization’s network. Given AVideo’s role as a video platform, organizations relying on it for content delivery or internal communications face risks of operational downtime and reputational damage. The vulnerability’s ease of exploitation and full impact on confidentiality, integrity, and availability make it a critical threat globally.

Mitigation Recommendations

Organizations should immediately upgrade WWBN AVideo to a version later than 26.0 where the patch (commit c85d076375fab095a14170df7ddb27058134d38c) has been applied. If upgrading is not immediately possible, restrict access to the vulnerable endpoints (`clones.json.php`, `cloneServer.json.php`, and `cloneClient.json.php`) via network-level controls such as firewalls or web application firewalls (WAFs). Implement strict access controls and authentication mechanisms around these endpoints. Replace MD5 password hashes with a strong, modern hashing algorithm like bcrypt or Argon2 to prevent easy cracking. Conduct thorough audits of server logs and systems for signs of compromise. Employ runtime application self-protection (RASP) or intrusion detection systems (IDS) to detect anomalous command execution attempts. Regularly monitor for updates from WWBN and apply security patches promptly. Finally, consider isolating AVideo servers in segmented network zones to limit lateral movement if compromised.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-20T16:16:48.970Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c14e9ef4197a8e3b641c82

Added to database: 3/23/2026, 2:30:54 PM

Last enriched: 3/23/2026, 2:47:19 PM

Last updated: 3/23/2026, 3:40:41 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses