CVE-2026-33651: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in WWBN AVideo
CVE-2026-33651 is a high-severity SQL injection vulnerability in WWBN AVideo versions up to 26. 0. The flaw exists in the remindMe. json. php endpoint where the live_schedule_id parameter is not properly sanitized before being concatenated into a SQL LIKE clause. Although some internal functions apply intval() to local copies, the original tainted input remains unsanitized, enabling authenticated users to perform time-based blind SQL injection attacks. This allows attackers to extract arbitrary database contents, compromising confidentiality and integrity without requiring user interaction. A patch has been committed to address this issue. Organizations using affected versions should prioritize updating to mitigate this risk.
AI Analysis
Technical Summary
WWBN AVideo, an open-source video platform, suffers from a critical SQL injection vulnerability identified as CVE-2026-33651. The vulnerability arises in the remindMe.json.php endpoint, where the live_schedule_id parameter from user input ($_REQUEST) is passed through several functions without proper sanitization. Specifically, the parameter eventually reaches the Scheduler_commands::getAllActiveOrToRepeat() function, which directly concatenates the input into a SQL LIKE clause, enabling injection. Although intermediate functions such as new Live_schedule() and getUsers_idOrCompany() internally apply intval() to local copies of the parameter within ObjectYPT::getFromDb(), the original tainted variable remains unchanged and unsanitized. This improper neutralization of special elements in SQL commands (CWE-89) allows any authenticated user to conduct time-based blind SQL injection attacks. Exploiting this vulnerability, an attacker can extract sensitive database information, compromising confidentiality and integrity of the system. The vulnerability does not require user interaction beyond authentication and has a CVSS 3.1 score of 8.1, indicating high severity. A patch has been committed (commit 75d45780728294ededa1e3f842f95295d3e7d144) to fix this issue by properly sanitizing the input before database queries.
Potential Impact
The SQL injection vulnerability in WWBN AVideo can have severe consequences for organizations using affected versions. Attackers with authenticated access can exploit the flaw to perform time-based blind SQL injection, enabling them to extract arbitrary data from the backend database. This can lead to unauthorized disclosure of sensitive user information, video content metadata, credentials, or configuration data, severely impacting confidentiality. Integrity is also at risk as attackers might manipulate database queries or data if further exploited. Although availability is not directly impacted, the breach of confidentiality and integrity can lead to loss of trust, regulatory penalties, and potential lateral movement within the network. Given that AVideo is a platform for video content, organizations relying on it for media delivery, education, or corporate communications may face significant operational and reputational damage. The requirement for authentication limits exploitation to users with some level of access, but insider threats or compromised accounts increase risk. The absence of known exploits in the wild currently suggests a window for proactive mitigation.
Mitigation Recommendations
Organizations should immediately upgrade WWBN AVideo to a version that includes the patch from commit 75d45780728294ededa1e3f842f95295d3e7d144 or later. If upgrading is not immediately possible, implement strict input validation and sanitization on the live_schedule_id parameter, ensuring it is properly escaped or parameterized before database queries. Employ prepared statements with parameterized queries to eliminate direct concatenation of user input into SQL commands. Review and audit all code paths handling user input to confirm no other unsanitized parameters exist. Limit authenticated user privileges to the minimum necessary to reduce the impact of compromised accounts. Monitor logs for unusual query patterns indicative of SQL injection attempts, especially time-based delays. Consider deploying Web Application Firewalls (WAFs) with rules targeting SQL injection signatures specific to AVideo endpoints. Conduct regular security assessments and penetration tests focusing on injection vulnerabilities. Maintain an incident response plan to quickly address any detected exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2026-33651: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in WWBN AVideo
Description
CVE-2026-33651 is a high-severity SQL injection vulnerability in WWBN AVideo versions up to 26. 0. The flaw exists in the remindMe. json. php endpoint where the live_schedule_id parameter is not properly sanitized before being concatenated into a SQL LIKE clause. Although some internal functions apply intval() to local copies, the original tainted input remains unsanitized, enabling authenticated users to perform time-based blind SQL injection attacks. This allows attackers to extract arbitrary database contents, compromising confidentiality and integrity without requiring user interaction. A patch has been committed to address this issue. Organizations using affected versions should prioritize updating to mitigate this risk.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
WWBN AVideo, an open-source video platform, suffers from a critical SQL injection vulnerability identified as CVE-2026-33651. The vulnerability arises in the remindMe.json.php endpoint, where the live_schedule_id parameter from user input ($_REQUEST) is passed through several functions without proper sanitization. Specifically, the parameter eventually reaches the Scheduler_commands::getAllActiveOrToRepeat() function, which directly concatenates the input into a SQL LIKE clause, enabling injection. Although intermediate functions such as new Live_schedule() and getUsers_idOrCompany() internally apply intval() to local copies of the parameter within ObjectYPT::getFromDb(), the original tainted variable remains unchanged and unsanitized. This improper neutralization of special elements in SQL commands (CWE-89) allows any authenticated user to conduct time-based blind SQL injection attacks. Exploiting this vulnerability, an attacker can extract sensitive database information, compromising confidentiality and integrity of the system. The vulnerability does not require user interaction beyond authentication and has a CVSS 3.1 score of 8.1, indicating high severity. A patch has been committed (commit 75d45780728294ededa1e3f842f95295d3e7d144) to fix this issue by properly sanitizing the input before database queries.
Potential Impact
The SQL injection vulnerability in WWBN AVideo can have severe consequences for organizations using affected versions. Attackers with authenticated access can exploit the flaw to perform time-based blind SQL injection, enabling them to extract arbitrary data from the backend database. This can lead to unauthorized disclosure of sensitive user information, video content metadata, credentials, or configuration data, severely impacting confidentiality. Integrity is also at risk as attackers might manipulate database queries or data if further exploited. Although availability is not directly impacted, the breach of confidentiality and integrity can lead to loss of trust, regulatory penalties, and potential lateral movement within the network. Given that AVideo is a platform for video content, organizations relying on it for media delivery, education, or corporate communications may face significant operational and reputational damage. The requirement for authentication limits exploitation to users with some level of access, but insider threats or compromised accounts increase risk. The absence of known exploits in the wild currently suggests a window for proactive mitigation.
Mitigation Recommendations
Organizations should immediately upgrade WWBN AVideo to a version that includes the patch from commit 75d45780728294ededa1e3f842f95295d3e7d144 or later. If upgrading is not immediately possible, implement strict input validation and sanitization on the live_schedule_id parameter, ensuring it is properly escaped or parameterized before database queries. Employ prepared statements with parameterized queries to eliminate direct concatenation of user input into SQL commands. Review and audit all code paths handling user input to confirm no other unsanitized parameters exist. Limit authenticated user privileges to the minimum necessary to reduce the impact of compromised accounts. Monitor logs for unusual query patterns indicative of SQL injection attempts, especially time-based delays. Consider deploying Web Application Firewalls (WAFs) with rules targeting SQL injection signatures specific to AVideo endpoints. Conduct regular security assessments and penetration tests focusing on injection vulnerabilities. Maintain an incident response plan to quickly address any detected exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T15:23:42.217Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c18de6f4197a8e3b82dd81
Added to database: 3/23/2026, 7:00:54 PM
Last enriched: 3/30/2026, 8:41:15 PM
Last updated: 5/7/2026, 4:32:58 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.