CVE-2026-33647: CWE-434: Unrestricted Upload of File with Dangerous Type in WWBN AVideo
CVE-2026-33647 is a high-severity vulnerability in WWBN AVideo versions up to 26. 0 that allows remote code execution via unrestricted upload of files with dangerous types. The flaw arises because the application validates uploaded file content using MIME type detection but does not enforce an allowlist on the file extension derived from the original filename. Attackers can upload a polyglot file containing valid JPEG data followed by embedded PHP code with a . php extension. Since the MIME check passes, the file is saved as an executable PHP script in a web-accessible directory, enabling execution of arbitrary code on the server. No user interaction is required, and only low privileges are needed to exploit this vulnerability. Although no known exploits are reported in the wild, the impact on confidentiality, integrity, and availability is severe. A patch has been committed to fix this issue by properly restricting file extensions. Organizations using affected versions should urgently apply the patch or implement strict file extension validation and upload directory protections.
AI Analysis
Technical Summary
The vulnerability CVE-2026-33647 affects WWBN AVideo, an open-source video platform, in versions up to and including 26.0. The root cause lies in the ImageGallery::saveFile() method, which validates uploaded files using MIME type detection via the finfo library. However, the filename extension used to save the file is taken directly from the user-supplied original filename without any allowlist or sanitization. This allows an attacker to craft a polyglot file that begins with valid JPEG magic bytes to pass the MIME check but contains embedded PHP code appended after the image data. When uploaded with a .php extension, the file is saved in a web-accessible directory as an executable PHP script. This leads to remote code execution (RCE) on the server with the privileges of the web server process. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). The CVSS v3.1 base score is 8.8 (high), reflecting network attack vector, low attack complexity, low privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability is critical due to the ease of exploitation and potential for full system compromise. A patch has been committed (commit 345a8d3ece0ad1e1b71a704c1579cbf885d8f3ae) that addresses the issue by enforcing an allowlist on file extensions and improving upload validation. The flaw highlights the risk of relying solely on MIME type checks without validating file extensions and underscores the importance of secure file upload handling in web applications.
Potential Impact
This vulnerability enables remote attackers to execute arbitrary PHP code on affected WWBN AVideo servers by uploading malicious files disguised as images. Successful exploitation can lead to full system compromise, including unauthorized access to sensitive data, modification or deletion of content, installation of backdoors or malware, and disruption of service. Given that AVideo is a video platform often deployed in media, education, and enterprise environments, the impact extends to data confidentiality breaches, reputational damage, and potential regulatory non-compliance. The attack requires only low privileges and no user interaction, increasing the risk of automated exploitation. Organizations running vulnerable versions face significant risk of compromise, especially if the server is internet-facing. The vulnerability also facilitates lateral movement within networks if exploited, potentially affecting broader organizational infrastructure.
Mitigation Recommendations
Organizations should immediately upgrade WWBN AVideo to a version that includes the patch from commit 345a8d3ece0ad1e1b71a704c1579cbf885d8f3ae or later. If upgrading is not immediately possible, implement strict server-side validation of uploaded files by enforcing an allowlist of permitted file extensions and rejecting any uploads with executable extensions such as .php. Additionally, configure the web server to prevent execution of scripts in upload directories by disabling PHP execution or using separate storage locations outside the web root. Employ file integrity monitoring to detect unauthorized file uploads and conduct regular security audits of upload handling code. Network-level controls such as web application firewalls (WAFs) can help detect and block suspicious upload attempts. Finally, educate developers on secure file upload practices, including validating both MIME types and file extensions, and sanitizing filenames to prevent injection of malicious code.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Japan, South Korea, India, Brazil, Netherlands, Italy, Spain
CVE-2026-33647: CWE-434: Unrestricted Upload of File with Dangerous Type in WWBN AVideo
Description
CVE-2026-33647 is a high-severity vulnerability in WWBN AVideo versions up to 26. 0 that allows remote code execution via unrestricted upload of files with dangerous types. The flaw arises because the application validates uploaded file content using MIME type detection but does not enforce an allowlist on the file extension derived from the original filename. Attackers can upload a polyglot file containing valid JPEG data followed by embedded PHP code with a . php extension. Since the MIME check passes, the file is saved as an executable PHP script in a web-accessible directory, enabling execution of arbitrary code on the server. No user interaction is required, and only low privileges are needed to exploit this vulnerability. Although no known exploits are reported in the wild, the impact on confidentiality, integrity, and availability is severe. A patch has been committed to fix this issue by properly restricting file extensions. Organizations using affected versions should urgently apply the patch or implement strict file extension validation and upload directory protections.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability CVE-2026-33647 affects WWBN AVideo, an open-source video platform, in versions up to and including 26.0. The root cause lies in the ImageGallery::saveFile() method, which validates uploaded files using MIME type detection via the finfo library. However, the filename extension used to save the file is taken directly from the user-supplied original filename without any allowlist or sanitization. This allows an attacker to craft a polyglot file that begins with valid JPEG magic bytes to pass the MIME check but contains embedded PHP code appended after the image data. When uploaded with a .php extension, the file is saved in a web-accessible directory as an executable PHP script. This leads to remote code execution (RCE) on the server with the privileges of the web server process. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). The CVSS v3.1 base score is 8.8 (high), reflecting network attack vector, low attack complexity, low privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability is critical due to the ease of exploitation and potential for full system compromise. A patch has been committed (commit 345a8d3ece0ad1e1b71a704c1579cbf885d8f3ae) that addresses the issue by enforcing an allowlist on file extensions and improving upload validation. The flaw highlights the risk of relying solely on MIME type checks without validating file extensions and underscores the importance of secure file upload handling in web applications.
Potential Impact
This vulnerability enables remote attackers to execute arbitrary PHP code on affected WWBN AVideo servers by uploading malicious files disguised as images. Successful exploitation can lead to full system compromise, including unauthorized access to sensitive data, modification or deletion of content, installation of backdoors or malware, and disruption of service. Given that AVideo is a video platform often deployed in media, education, and enterprise environments, the impact extends to data confidentiality breaches, reputational damage, and potential regulatory non-compliance. The attack requires only low privileges and no user interaction, increasing the risk of automated exploitation. Organizations running vulnerable versions face significant risk of compromise, especially if the server is internet-facing. The vulnerability also facilitates lateral movement within networks if exploited, potentially affecting broader organizational infrastructure.
Mitigation Recommendations
Organizations should immediately upgrade WWBN AVideo to a version that includes the patch from commit 345a8d3ece0ad1e1b71a704c1579cbf885d8f3ae or later. If upgrading is not immediately possible, implement strict server-side validation of uploaded files by enforcing an allowlist of permitted file extensions and rejecting any uploads with executable extensions such as .php. Additionally, configure the web server to prevent execution of scripts in upload directories by disabling PHP execution or using separate storage locations outside the web root. Employ file integrity monitoring to detect unauthorized file uploads and conduct regular security audits of upload handling code. Network-level controls such as web application firewalls (WAFs) can help detect and block suspicious upload attempts. Finally, educate developers on secure file upload practices, including validating both MIME types and file extensions, and sanitizing filenames to prevent injection of malicious code.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T15:23:42.217Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c18a60f4197a8e3b8159eb
Added to database: 3/23/2026, 6:45:52 PM
Last enriched: 3/23/2026, 7:01:59 PM
Last updated: 3/23/2026, 8:38:20 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.