Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33513: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WWBN AVideo

0
High
VulnerabilityCVE-2026-33513cvecve-2026-33513cwe-22cwe-98
Published: Mon Mar 23 2026 (03/23/2026, 18:21:59 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-33513 is a high-severity path traversal vulnerability in WWBN AVideo versions up to 26. 0. An unauthenticated API endpoint improperly concatenates user input into a file include path without validation, allowing attackers to traverse directories and include arbitrary PHP files within the web root. This can lead to file disclosure and limited code execution of existing PHP files. If an attacker can upload or control PHP files elsewhere in the directory tree, full remote code execution (RCE) is possible. No patches are currently available. The vulnerability has a CVSS score of 8. 6, indicating a critical risk due to its ease of exploitation without authentication or user interaction. Organizations using AVideo should apply strict input validation, disable vulnerable API endpoints, and monitor for suspicious activity until a patch is released.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 19:02:13 UTC

Technical Analysis

WWBN AVideo, an open-source video platform, suffers from a critical path traversal vulnerability identified as CVE-2026-33513 affecting all versions up to and including 26.0. The flaw exists in an unauthenticated API endpoint named `locale`, which concatenates user-supplied input directly into an include path without performing canonicalization or enforcing a whitelist. This improper limitation of pathname (CWE-22) allows attackers to traverse directories by manipulating the input, thereby including arbitrary PHP files located under the web root. In practical tests, this vulnerability enabled attackers to disclose sensitive files and execute code within existing PHP files such as `view/about.php`. While direct remote code execution (RCE) is not guaranteed solely through this flaw, it becomes feasible if the attacker can place or control PHP files elsewhere in the application’s directory structure, effectively escalating the attack to full RCE. The vulnerability is exploitable remotely without any authentication or user interaction, making it highly dangerous. Despite its severity, no official patches or updates have been released at the time of publication. The CVSS v3.1 score of 8.6 reflects the high impact on confidentiality and availability, with low attack complexity and no privileges required. The vulnerability also relates to CWE-98, indicating improper control of filename for inclusion. This combination of factors makes CVE-2026-33513 a critical threat to all deployments of WWBN AVideo prior to version 26.1.

Potential Impact

The impact of CVE-2026-33513 on organizations using WWBN AVideo is significant. Exploitation can lead to unauthorized disclosure of sensitive files, potentially exposing configuration files, source code, or other private data. The ability to include arbitrary PHP files can allow attackers to execute arbitrary code within the context of the web server, leading to partial or full compromise of the affected system. If attackers can upload or control PHP files elsewhere on the server, they can achieve full remote code execution, enabling them to execute arbitrary commands, pivot within the network, or deploy persistent backdoors. This can result in data breaches, service disruption, defacement, or use of the compromised server as a launchpad for further attacks. Given the unauthenticated nature of the vulnerability and the lack of required user interaction, exploitation can be automated and widespread. Organizations relying on AVideo for video hosting or streaming services face risks to their operational continuity, data confidentiality, and reputation. The absence of a patch increases exposure time, urging immediate mitigation efforts. Additionally, attackers may leverage this vulnerability to target high-value organizations using AVideo, increasing the threat to sectors such as media, education, and entertainment.

Mitigation Recommendations

Until an official patch is released, organizations should implement several specific mitigations to reduce risk. First, disable or restrict access to the vulnerable `locale` API endpoint, especially from untrusted networks or the public internet, using web application firewalls (WAFs) or network access controls. Second, implement strict input validation and sanitization on all user-supplied inputs, particularly those used in file path construction, enforcing canonicalization and whitelisting allowed filenames or directories. Third, review and harden file permissions on the web server to prevent unauthorized upload or modification of PHP files outside intended directories, limiting the attacker's ability to escalate to full RCE. Fourth, monitor web server logs and application logs for suspicious requests containing path traversal patterns such as '../' sequences or unusual file inclusion attempts. Fifth, consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) tools to detect and block exploitation attempts in real time. Finally, maintain regular backups and prepare incident response plans to quickly recover from potential compromises. Organizations should also track WWBN’s updates closely and apply patches immediately once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-20T16:59:08.891Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c18a60f4197a8e3b8159e8

Added to database: 3/23/2026, 6:45:52 PM

Last enriched: 3/23/2026, 7:02:13 PM

Last updated: 3/23/2026, 8:38:22 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses