Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33723: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in WWBN AVideo

0
High
VulnerabilityCVE-2026-33723cvecve-2026-33723cwe-89
Published: Mon Mar 23 2026 (03/23/2026, 18:50:33 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-33723 is a high-severity SQL Injection vulnerability in WWBN AVideo versions up to 26. 0. The flaw exists in the Subscribe::save() method where user input from $_POST['user_id'] is concatenated directly into an SQL INSERT statement without sanitization or parameterization. An authenticated attacker can exploit this to execute arbitrary SQL commands, potentially extracting sensitive data such as password hashes, API keys, and encryption salts. The vulnerability requires authentication but no user interaction beyond sending crafted requests. A patch has been committed to fix this issue. Organizations using affected versions should update promptly to prevent data breaches. The vulnerability impacts confidentiality severely, with limited impact on integrity and no impact on availability. Countries with significant WWBN AVideo usage and strategic interest in video platforms are at higher risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:37:38 UTC

Technical Analysis

CVE-2026-33723 identifies a SQL Injection vulnerability in the open-source video platform WWBN AVideo, affecting all versions up to and including 26.0. The root cause lies in the Subscribe::save() method within the objects/subscribe.php file, where the $this->users_id property is directly concatenated into an SQL INSERT query without any input sanitization or use of parameterized queries. This property is sourced from user-controlled input ($_POST['user_id']) in subscribe.json.php and subscribeNotify.json.php. Because the input is not neutralized, an authenticated attacker can inject malicious SQL code, enabling unauthorized data extraction from any database table. This includes highly sensitive information such as password hashes, API keys, and encryption salts, which could facilitate further compromise. The vulnerability is exploitable remotely over the network with low attack complexity, requiring only authenticated access and no additional user interaction. The scope is limited to installations running vulnerable versions of AVideo. A patch has been committed (commit 36dfae22059fbd66fd34bbc5568a838fc0efd66c) that addresses the issue by implementing proper input validation and parameterized queries. The CVSS v3.1 base score is 7.1, reflecting high severity due to the potential confidentiality impact and ease of exploitation with authentication.

Potential Impact

The primary impact of this vulnerability is a severe breach of confidentiality, as attackers can extract sensitive data including password hashes, API keys, and encryption salts from the backend database. This can lead to account takeovers, unauthorized access to other integrated systems, and further lateral movement within the affected environment. While the integrity impact is limited to potential unauthorized data insertion or modification via SQL injection, the vulnerability does not affect system availability. Organizations relying on WWBN AVideo for video hosting or streaming services risk significant data exposure and reputational damage if exploited. The requirement for authentication limits the attack surface to users with valid credentials, but insider threats or compromised accounts can still leverage this flaw. The absence of known exploits in the wild currently reduces immediate risk, but the public disclosure and availability of a patch increase the urgency for remediation to prevent future exploitation.

Mitigation Recommendations

Organizations should immediately upgrade WWBN AVideo installations to versions beyond 26.0 where the patch commit 36dfae22059fbd66fd34bbc5568a838fc0efd66c has been applied. If upgrading is not immediately possible, implement strict input validation and sanitization on the user_id parameter at the web application firewall (WAF) or application layer to block malicious SQL payloads. Employ parameterized queries or prepared statements in custom code if modifications are made. Restrict authenticated user privileges to the minimum necessary to reduce the risk of exploitation by compromised accounts. Monitor logs for unusual database queries or unexpected access patterns related to subscription functionality. Conduct regular security audits and penetration tests focusing on injection flaws. Additionally, enforce multi-factor authentication (MFA) to reduce the risk of account compromise that could lead to exploitation of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T17:34:57.559Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c18de8f4197a8e3b82ea8b

Added to database: 3/23/2026, 7:00:56 PM

Last enriched: 3/30/2026, 8:37:38 PM

Last updated: 5/8/2026, 10:30:32 PM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses