Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33681: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WWBN AVideo

0
High
VulnerabilityCVE-2026-33681cvecve-2026-33681cwe-22
Published: Mon Mar 23 2026 (03/23/2026, 18:39:33 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-33681 is a high-severity path traversal vulnerability in WWBN AVideo versions up to 26. 0. The vulnerability exists in the objects/pluginRunDatabaseScript. json. php endpoint, which accepts a 'name' parameter without proper sanitization. An authenticated administrator or an attacker exploiting CSRF can traverse directories to execute arbitrary SQL scripts located outside the intended plugin directory. This allows execution of any install. sql file as raw SQL queries against the application database, potentially compromising confidentiality, integrity, and availability. The vulnerability requires administrative privileges or CSRF exploitation but does not require user interaction beyond that. A patch has been committed to address this issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:32:50 UTC

Technical Analysis

CVE-2026-33681 is a path traversal vulnerability classified under CWE-22 affecting WWBN AVideo, an open-source video platform. In versions up to and including 26.0, the endpoint objects/pluginRunDatabaseScript.json.php accepts a POST parameter 'name' which is passed directly to the Plugin::getDatabaseFileName() function without any sanitization or validation to prevent directory traversal. This flaw allows an authenticated administrator or an attacker leveraging Cross-Site Request Forgery (CSRF) to specify a path outside the intended plugin directory. By doing so, the attacker can cause the application to read and execute the contents of any install/install.sql file on the filesystem as raw SQL queries against the backend database. This can lead to unauthorized data manipulation, data leakage, or complete compromise of the database integrity and availability. The vulnerability is particularly dangerous because it allows execution of arbitrary SQL commands, potentially enabling privilege escalation, data destruction, or data exfiltration. The vulnerability has a CVSS v3.1 base score of 7.2, indicating high severity, with attack vector network, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. A patch has been committed (commit 81b591c509835505cb9f298aa1162ac64c4152cb) that properly sanitizes the input to prevent path traversal. No known exploits in the wild have been reported as of the publication date.

Potential Impact

The impact of CVE-2026-33681 is significant for organizations using WWBN AVideo versions 26.0 and earlier. Successful exploitation allows an attacker with administrative privileges or via CSRF to execute arbitrary SQL scripts, potentially leading to full database compromise. This can result in unauthorized data disclosure, data corruption, deletion, or unauthorized privilege escalation within the application. The ability to execute arbitrary SQL commands can also facilitate lateral movement within the network if the database contains sensitive credentials or configuration data. The availability of the video platform service can be disrupted by destructive SQL commands. Given the role of AVideo in hosting and streaming video content, such compromise could lead to service outages, loss of user trust, and regulatory compliance issues related to data breaches. Organizations relying on AVideo for critical video infrastructure should consider this vulnerability a high risk and prioritize remediation.

Mitigation Recommendations

Organizations should immediately update WWBN AVideo to a version that includes the patch addressing CVE-2026-33681. If an immediate upgrade is not feasible, restrict access to the administrative interface and the vulnerable endpoint to trusted IP addresses only. Implement strong CSRF protections to prevent unauthorized requests from authenticated administrators. Review and harden file system permissions to ensure that the application user cannot access or execute unintended SQL files outside the plugin directory. Conduct a thorough audit of database logs for any suspicious SQL execution that could indicate exploitation attempts. Additionally, monitor network traffic for unusual POST requests to the pluginRunDatabaseScript.json.php endpoint. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal patterns in the 'name' parameter. Finally, educate administrators about the risks of CSRF and enforce the use of multi-factor authentication to reduce the risk of credential compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T16:34:59.931Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c18de6f4197a8e3b82dd85

Added to database: 3/23/2026, 7:00:54 PM

Last enriched: 3/30/2026, 8:32:50 PM

Last updated: 5/8/2026, 10:56:50 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses