Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33717: CWE-434: Unrestricted Upload of File with Dangerous Type in WWBN AVideo

0
High
VulnerabilityCVE-2026-33717cvecve-2026-33717cwe-434
Published: Mon Mar 23 2026 (03/23/2026, 18:48:24 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-33717 is a high-severity vulnerability in WWBN AVideo versions up to 26. 0 that allows unrestricted upload of executable PHP files. The flaw exists in the downloadVideoFromDownloadURL() function, which saves remote content using the original filename and extension without proper validation. By manipulating the resolution parameter, an attacker can cause the process to terminate early, leaving a malicious PHP file accessible in the web root. This enables remote code execution with low complexity and no user interaction. The vulnerability impacts confidentiality, integrity, and availability of affected systems. A patch has been committed but not yet widely distributed. Organizations using AVideo should urgently apply the fix and restrict access to temporary upload directories to mitigate risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 19:16:33 UTC

Technical Analysis

The vulnerability CVE-2026-33717 affects WWBN AVideo, an open-source video platform, in all versions up to and including 26.0. The root cause lies in the downloadVideoFromDownloadURL() function within the objects/aVideoEncoder.json.php file. This function downloads remote video content and saves it temporarily in a web-accessible directory named videos/cache/tmpFile/. It uses the original filename and extension from the remote URL without sanitization, allowing files with dangerous extensions such as .php to be saved. An attacker can exploit this by supplying a crafted resolution parameter that triggers an early termination of the function via forbiddenPage(), preventing the temporary file from being moved or deleted. Consequently, the malicious PHP file remains accessible under the web root, enabling remote code execution. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring only privileges of a logged-in user but no user interaction. Although no known exploits are reported in the wild yet, the vulnerability poses a significant risk due to its ease of exploitation and potential for full system compromise. A patch has been committed (commit 6da79b43484099a0b660d1544a63c07b633ed3a2) to address this issue by properly handling file uploads and preventing dangerous file types from persisting in web-accessible locations.

Potential Impact

If exploited, this vulnerability allows attackers to upload and execute arbitrary PHP code on the affected server, leading to full remote code execution. This compromises the confidentiality of sensitive data stored or processed by the platform, undermines data integrity by allowing unauthorized modifications, and threatens availability through potential service disruption or destruction. Attackers could leverage this access to pivot within the network, deploy malware, or establish persistent backdoors. Given that AVideo is a video hosting platform, organizations relying on it for content delivery or internal video services face risks of data leakage, defacement, or complete system takeover. The ease of exploitation and the lack of required user interaction increase the likelihood of successful attacks, especially in environments where authenticated access is not tightly controlled. This vulnerability could also damage organizational reputation and lead to regulatory compliance issues if exploited.

Mitigation Recommendations

Organizations should immediately upgrade WWBN AVideo to a version that includes the patch from commit 6da79b43484099a0b660d1544a63c07b633ed3a2 or apply equivalent fixes to sanitize and validate file uploads rigorously. Restrict write permissions to the videos/cache/tmpFile/ directory and ensure it is not web-accessible or executable by configuring web server settings (e.g., disabling PHP execution in that directory). Implement strict input validation on parameters such as resolution to prevent early termination logic bypass. Employ web application firewalls (WAFs) to detect and block suspicious file upload attempts and anomalous HTTP requests targeting this functionality. Regularly audit and monitor the upload directories for unexpected files and maintain comprehensive logging to detect exploitation attempts. Additionally, enforce least privilege principles for authenticated users and consider multi-factor authentication to reduce the risk of credential abuse.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T17:06:05.748Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c18de8f4197a8e3b82ea83

Added to database: 3/23/2026, 7:00:56 PM

Last enriched: 3/23/2026, 7:16:33 PM

Last updated: 3/23/2026, 9:09:11 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses