Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33648: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in WWBN AVideo

0
High
VulnerabilityCVE-2026-33648cvecve-2026-33648cwe-78
Published: Mon Mar 23 2026 (03/23/2026, 18:25:07 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the restreamer endpoint constructs a log file path by embedding user-controlled `users_id` and `liveTransmitionHistory_id` values from the JSON request body without any sanitization. This log file path is then concatenated directly into shell commands passed to `exec()`, allowing an authenticated user to achieve arbitrary command execution on the server via shell metacharacters such as `$()` or backticks. Commit 99b865413172045fef6a98b5e9bfc7b24da11678 contains a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:18:17 UTC

Technical Analysis

CVE-2026-33648 is an OS command injection vulnerability identified in WWBN AVideo, an open-source video platform widely used for video streaming and management. The vulnerability affects all versions up to and including 26.0. The root cause lies in the restreamer endpoint, which constructs a log file path by embedding two user-controlled parameters, `users_id` and `liveTransmitionHistory_id`, directly from the JSON request body into shell commands executed via PHP's `exec()` function. Because these inputs are not sanitized or neutralized, an authenticated attacker can inject shell metacharacters such as `$()` or backticks to execute arbitrary OS commands with the privileges of the web server process. This can lead to full system compromise, data exfiltration, or service disruption. The vulnerability requires authentication but no additional user interaction. The CVSS v3.1 score is 8.8, reflecting high impact on confidentiality, integrity, and availability with low attack complexity. A patch has been committed (commit 99b865413172045fef6a98b5e9bfc7b24da11678) that properly sanitizes inputs to prevent command injection. No known exploits are reported in the wild yet, but the vulnerability is critical enough to warrant immediate remediation.

Potential Impact

The impact of this vulnerability is severe for organizations using WWBN AVideo versions up to 26.0. Successful exploitation allows an authenticated attacker to execute arbitrary commands on the underlying server, potentially leading to complete system compromise. This can result in unauthorized data access or modification, service disruption, deployment of malware or ransomware, and lateral movement within the network. Given that AVideo is often used to manage and stream video content, attackers could also manipulate or delete valuable media assets, impacting business operations and reputation. The vulnerability affects confidentiality, integrity, and availability simultaneously. Since exploitation requires only authentication and no user interaction, insider threats or compromised credentials could be leveraged easily. Organizations relying on AVideo for video delivery or content management face significant operational and security risks if unpatched.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade WWBN AVideo to a version that includes the patch from commit 99b865413172045fef6a98b5e9bfc7b24da11678 or later. If upgrading is not immediately possible, implement strict input validation and sanitization on the `users_id` and `liveTransmitionHistory_id` parameters to neutralize shell metacharacters before they reach the `exec()` call. Restrict access to the restreamer endpoint to trusted authenticated users only, and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of credential compromise. Monitor server logs for suspicious command execution patterns or unexpected shell activity. Employ application-layer firewalls or runtime application self-protection (RASP) solutions to detect and block command injection attempts. Regularly audit and review user privileges to minimize the number of accounts with access to vulnerable endpoints. Finally, conduct penetration testing and code reviews focusing on command injection vectors in custom deployments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T15:23:42.217Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c18a60f4197a8e3b8159ef

Added to database: 3/23/2026, 6:45:52 PM

Last enriched: 3/30/2026, 8:18:17 PM

Last updated: 5/7/2026, 4:32:49 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses