CVE-2026-33485: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in WWBN AVideo
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the RTMP `on_publish` callback at `plugin/Live/on_publish.php` is accessible without authentication. The `$_POST['name']` parameter (stream key) is interpolated directly into SQL queries in two locations — `LiveTransmitionHistory::getLatest()` and `LiveTransmition::keyExists()` — without parameterized binding or escaping. An unauthenticated attacker can exploit time-based blind SQL injection to extract all database contents including user password hashes, email addresses, and other sensitive data. Commit af59eade82de645b20183cc3d74467a7eac76549 contains a patch.
AI Analysis
Technical Summary
WWBN AVideo, an open-source video platform, suffers from a critical SQL injection vulnerability identified as CVE-2026-33485 affecting versions up to and including 26.0. The vulnerability is located in the RTMP on_publish callback handler (plugin/Live/on_publish.php), which is accessible without any authentication, exposing an attack surface to unauthenticated remote attackers. The root cause is the unsafe handling of the $_POST['name'] parameter, representing the stream key, which is directly embedded into SQL queries within the LiveTransmitionHistory::getLatest() and LiveTransmition::keyExists() functions. These queries do not use parameterized statements or proper escaping, leading to improper neutralization of special SQL elements (CWE-89). Exploitation is possible via time-based blind SQL injection techniques, enabling attackers to extract the entire database contents, including sensitive user data such as password hashes and email addresses. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting its high severity due to network attack vector, no required privileges or user interaction, and high confidentiality impact. Although no public exploits are currently known, the presence of a patch commit (af59eade82de645b20183cc3d74467a7eac76549) indicates that the vendor has addressed the issue. The vulnerability poses a significant risk to any deployment of affected AVideo versions, especially those exposed to untrusted networks.
Potential Impact
The impact of CVE-2026-33485 is substantial for organizations using WWBN AVideo versions up to 26.0. Successful exploitation allows unauthenticated remote attackers to perform time-based blind SQL injection attacks, leading to full disclosure of the backend database. This includes sensitive user information such as password hashes and email addresses, which can facilitate further attacks like credential stuffing, phishing, or identity theft. The vulnerability compromises confidentiality but does not affect integrity or availability directly. However, the exposure of sensitive data can lead to reputational damage, regulatory penalties (e.g., GDPR), and loss of user trust. Since the vulnerable endpoint is accessible without authentication, attackers can exploit this flaw at scale if the service is internet-facing. Organizations relying on AVideo for video streaming services, especially those handling personal or sensitive data, face a high risk of data breach and subsequent exploitation.
Mitigation Recommendations
To mitigate CVE-2026-33485, organizations should immediately upgrade to a patched version of WWBN AVideo that includes the fix committed in af59eade82de645b20183cc3d74467a7eac76549 or later. If upgrading is not immediately possible, implement the following specific mitigations: 1) Restrict network access to the RTMP on_publish endpoint by firewalling or IP whitelisting to trusted sources only. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection payloads targeting the vulnerable parameter. 3) Conduct code review and refactor the affected functions to use parameterized SQL queries or prepared statements to ensure proper input sanitization. 4) Monitor logs for unusual or repeated access patterns to the on_publish.php endpoint indicative of exploitation attempts. 5) Enforce strong password policies and consider additional user authentication mechanisms to reduce the impact of leaked credentials. 6) Regularly audit and update all third-party components to incorporate security patches promptly. These targeted actions go beyond generic advice by focusing on the specific vulnerable endpoint and parameter.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Japan, India, Brazil, Netherlands
CVE-2026-33485: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in WWBN AVideo
Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the RTMP `on_publish` callback at `plugin/Live/on_publish.php` is accessible without authentication. The `$_POST['name']` parameter (stream key) is interpolated directly into SQL queries in two locations — `LiveTransmitionHistory::getLatest()` and `LiveTransmition::keyExists()` — without parameterized binding or escaping. An unauthenticated attacker can exploit time-based blind SQL injection to extract all database contents including user password hashes, email addresses, and other sensitive data. Commit af59eade82de645b20183cc3d74467a7eac76549 contains a patch.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
WWBN AVideo, an open-source video platform, suffers from a critical SQL injection vulnerability identified as CVE-2026-33485 affecting versions up to and including 26.0. The vulnerability is located in the RTMP on_publish callback handler (plugin/Live/on_publish.php), which is accessible without any authentication, exposing an attack surface to unauthenticated remote attackers. The root cause is the unsafe handling of the $_POST['name'] parameter, representing the stream key, which is directly embedded into SQL queries within the LiveTransmitionHistory::getLatest() and LiveTransmition::keyExists() functions. These queries do not use parameterized statements or proper escaping, leading to improper neutralization of special SQL elements (CWE-89). Exploitation is possible via time-based blind SQL injection techniques, enabling attackers to extract the entire database contents, including sensitive user data such as password hashes and email addresses. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting its high severity due to network attack vector, no required privileges or user interaction, and high confidentiality impact. Although no public exploits are currently known, the presence of a patch commit (af59eade82de645b20183cc3d74467a7eac76549) indicates that the vendor has addressed the issue. The vulnerability poses a significant risk to any deployment of affected AVideo versions, especially those exposed to untrusted networks.
Potential Impact
The impact of CVE-2026-33485 is substantial for organizations using WWBN AVideo versions up to 26.0. Successful exploitation allows unauthenticated remote attackers to perform time-based blind SQL injection attacks, leading to full disclosure of the backend database. This includes sensitive user information such as password hashes and email addresses, which can facilitate further attacks like credential stuffing, phishing, or identity theft. The vulnerability compromises confidentiality but does not affect integrity or availability directly. However, the exposure of sensitive data can lead to reputational damage, regulatory penalties (e.g., GDPR), and loss of user trust. Since the vulnerable endpoint is accessible without authentication, attackers can exploit this flaw at scale if the service is internet-facing. Organizations relying on AVideo for video streaming services, especially those handling personal or sensitive data, face a high risk of data breach and subsequent exploitation.
Mitigation Recommendations
To mitigate CVE-2026-33485, organizations should immediately upgrade to a patched version of WWBN AVideo that includes the fix committed in af59eade82de645b20183cc3d74467a7eac76549 or later. If upgrading is not immediately possible, implement the following specific mitigations: 1) Restrict network access to the RTMP on_publish endpoint by firewalling or IP whitelisting to trusted sources only. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection payloads targeting the vulnerable parameter. 3) Conduct code review and refactor the affected functions to use parameterized SQL queries or prepared statements to ensure proper input sanitization. 4) Monitor logs for unusual or repeated access patterns to the on_publish.php endpoint indicative of exploitation attempts. 5) Enforce strong password policies and consider additional user authentication mechanisms to reduce the impact of leaked credentials. 6) Regularly audit and update all third-party components to incorporate security patches promptly. These targeted actions go beyond generic advice by focusing on the specific vulnerable endpoint and parameter.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-20T16:16:48.971Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c14e9ef4197a8e3b641c96
Added to database: 3/23/2026, 2:30:54 PM
Last enriched: 3/30/2026, 8:21:03 PM
Last updated: 5/7/2026, 4:30:02 AM
Views: 95
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.