Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33767: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in WWBN AVideo

0
High
VulnerabilityCVE-2026-33767cvecve-2026-33767cwe-89
Published: Fri Mar 27 2026 (03/27/2026, 16:12:36 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, in `objects/like.php`, the `getLike()` method constructs a SQL query using a prepared statement placeholder (`?`) for `users_id` but directly concatenates `$this->videos_id` into the query string without parameterization. An attacker who can control the `videos_id` value (via a crafted request) can inject arbitrary SQL, bypassing the partial prepared-statement protection. Commit 0215d3c4f1ee748b8880254967b51784b8ac4080 contains a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 18:00:04 UTC

Technical Analysis

CVE-2026-33767 is an SQL Injection vulnerability identified in the open-source video platform WWBN AVideo, affecting all versions up to and including 26.0. The vulnerability arises in the getLike() method within the objects/like.php file. While the method uses a prepared statement placeholder for the users_id parameter, it directly concatenates the videos_id parameter into the SQL query string without parameterization. This improper neutralization of special elements (CWE-89) allows an attacker who can control the videos_id value—typically via crafted HTTP requests—to inject arbitrary SQL commands. This injection bypasses the partial protection provided by the prepared statement for users_id. The vulnerability does not require user interaction but does require some level of privileges (likely authenticated access). The CVSS 4.0 base score is 7.1 (high), reflecting the network attack vector, low attack complexity, no user interaction, and high impact on confidentiality. The vulnerability can lead to unauthorized data disclosure, modification, or deletion within the AVideo database, potentially compromising user data and platform integrity. Although no known exploits are currently reported in the wild, a patch has been committed (commit 0215d3c4f1ee748b8880254967b51784b8ac4080) to address this issue. Organizations running affected versions should prioritize updating to patched versions to mitigate risk.

Potential Impact

The potential impact of CVE-2026-33767 is significant for organizations using WWBN AVideo as their video platform. Successful exploitation can lead to unauthorized access to sensitive data stored in the platform's database, including user information, video metadata, and possibly administrative data. Attackers could manipulate or delete data, undermining data integrity and availability. Given the platform's role in content delivery, such compromise could disrupt service availability or lead to reputational damage. Since the vulnerability allows injection of arbitrary SQL commands, attackers might escalate their access or pivot to other systems if database credentials or configurations are weak. The impact is magnified in environments where AVideo is integrated with other critical systems or contains sensitive user-generated content. Although exploitation requires some privileges, the low complexity and network accessibility make it a viable threat for attackers with limited access. Organizations worldwide relying on this platform for video hosting and streaming services face risks of data breaches, service disruption, and compliance violations if unpatched.

Mitigation Recommendations

To mitigate CVE-2026-33767, organizations should immediately update WWBN AVideo to a version that includes the patch (commit 0215d3c4f1ee748b8880254967b51784b8ac4080 or later). If immediate updating is not feasible, apply manual code fixes to ensure that the videos_id parameter is properly parameterized in SQL queries, avoiding direct concatenation. Implement rigorous input validation and sanitization for all user-controllable inputs, especially those used in database queries. Employ web application firewalls (WAFs) with rules targeting SQL injection patterns to provide an additional layer of defense. Conduct thorough code reviews and security testing focusing on database interactions. Restrict database user privileges to the minimum necessary to limit the impact of any injection. Monitor logs for anomalous database queries or errors indicative of injection attempts. Finally, educate developers on secure coding practices, emphasizing the importance of prepared statements and parameterization for all dynamic SQL components.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T18:30:14.127Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c6c20e3c064ed76fce99b4

Added to database: 3/27/2026, 5:44:46 PM

Last enriched: 3/27/2026, 6:00:04 PM

Last updated: 3/27/2026, 7:06:59 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses