CVE-2026-33770: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in WWBN AVideo
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `fixCleanTitle()` static method in `objects/category.php` constructs a SQL SELECT query by directly interpolating both `$clean_title` and `$id` into the query string without using prepared statements or parameterized queries. An attacker who can trigger category creation or renaming with a crafted title value can inject arbitrary SQL. Commit 994cc2b3d802b819e07e6088338e8bf4e484aae4 contains a patch.
AI Analysis
Technical Summary
CVE-2026-33770 is an SQL Injection vulnerability identified in the open-source video platform WWBN AVideo, affecting all versions up to and including 26.0. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89) within the static method fixCleanTitle() located in objects/category.php. Specifically, the method constructs a SQL SELECT query by directly embedding the variables $clean_title and $id into the query string without employing prepared statements or parameterized queries. This insecure coding practice allows an attacker who can trigger category creation or renaming with a crafted title value to inject arbitrary SQL commands. The injection can lead to unauthorized data access, data manipulation, or potentially full compromise of the backend database. The vulnerability has a CVSS 4.0 base score of 7.1, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges), no user interaction (UI:N), and high impact on confidentiality (VC:H). The vulnerability does not affect integrity or availability directly but poses a significant risk to data confidentiality. A patch has been committed (commit 994cc2b3d802b819e07e6088338e8bf4e484aae4) that addresses this issue by presumably implementing proper input sanitization or prepared statements. No known exploits have been reported in the wild as of the publication date. The vulnerability affects all installations of WWBN AVideo up to version 26.0, which is an open-source platform used globally for video content management and streaming.
Potential Impact
The SQL Injection vulnerability in WWBN AVideo can have severe consequences for organizations using the affected versions. Exploitation could allow attackers to execute arbitrary SQL commands on the backend database, leading to unauthorized disclosure of sensitive data such as user credentials, video metadata, or other private information stored in the database. Attackers could also manipulate or delete data, potentially disrupting service integrity. In multi-tenant or shared hosting environments, this could lead to cross-tenant data leakage. Since the vulnerability requires only low privileges and no user interaction, it lowers the barrier for exploitation by insiders or attackers who have limited access. The compromise of the database could also facilitate further attacks, including privilege escalation or lateral movement within the network. For organizations relying on AVideo for content delivery, this could result in reputational damage, regulatory non-compliance, and financial losses. The absence of known exploits in the wild provides a window for remediation, but the high severity score underscores the urgency of patching.
Mitigation Recommendations
Organizations should immediately upgrade to a patched version of WWBN AVideo that includes the fix for CVE-2026-33770. If upgrading is not immediately possible, administrators should implement input validation and sanitization on category titles and IDs to prevent injection of malicious SQL code. Employing Web Application Firewalls (WAFs) with rules targeting SQL Injection patterns can provide temporary protection. Restricting privileges for users who can create or rename categories reduces the risk surface. Database accounts used by the application should have the least privileges necessary to limit the impact of a successful injection. Regularly auditing logs for suspicious SQL errors or unusual database activity can help detect exploitation attempts. Additionally, code reviews and static analysis should be performed on customizations or plugins to ensure no similar injection flaws exist. Finally, organizations should monitor WWBN and security advisories for updates or exploit reports related to this vulnerability.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Netherlands, India, Brazil, Japan
CVE-2026-33770: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in WWBN AVideo
Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `fixCleanTitle()` static method in `objects/category.php` constructs a SQL SELECT query by directly interpolating both `$clean_title` and `$id` into the query string without using prepared statements or parameterized queries. An attacker who can trigger category creation or renaming with a crafted title value can inject arbitrary SQL. Commit 994cc2b3d802b819e07e6088338e8bf4e484aae4 contains a patch.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-33770 is an SQL Injection vulnerability identified in the open-source video platform WWBN AVideo, affecting all versions up to and including 26.0. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89) within the static method fixCleanTitle() located in objects/category.php. Specifically, the method constructs a SQL SELECT query by directly embedding the variables $clean_title and $id into the query string without employing prepared statements or parameterized queries. This insecure coding practice allows an attacker who can trigger category creation or renaming with a crafted title value to inject arbitrary SQL commands. The injection can lead to unauthorized data access, data manipulation, or potentially full compromise of the backend database. The vulnerability has a CVSS 4.0 base score of 7.1, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges), no user interaction (UI:N), and high impact on confidentiality (VC:H). The vulnerability does not affect integrity or availability directly but poses a significant risk to data confidentiality. A patch has been committed (commit 994cc2b3d802b819e07e6088338e8bf4e484aae4) that addresses this issue by presumably implementing proper input sanitization or prepared statements. No known exploits have been reported in the wild as of the publication date. The vulnerability affects all installations of WWBN AVideo up to version 26.0, which is an open-source platform used globally for video content management and streaming.
Potential Impact
The SQL Injection vulnerability in WWBN AVideo can have severe consequences for organizations using the affected versions. Exploitation could allow attackers to execute arbitrary SQL commands on the backend database, leading to unauthorized disclosure of sensitive data such as user credentials, video metadata, or other private information stored in the database. Attackers could also manipulate or delete data, potentially disrupting service integrity. In multi-tenant or shared hosting environments, this could lead to cross-tenant data leakage. Since the vulnerability requires only low privileges and no user interaction, it lowers the barrier for exploitation by insiders or attackers who have limited access. The compromise of the database could also facilitate further attacks, including privilege escalation or lateral movement within the network. For organizations relying on AVideo for content delivery, this could result in reputational damage, regulatory non-compliance, and financial losses. The absence of known exploits in the wild provides a window for remediation, but the high severity score underscores the urgency of patching.
Mitigation Recommendations
Organizations should immediately upgrade to a patched version of WWBN AVideo that includes the fix for CVE-2026-33770. If upgrading is not immediately possible, administrators should implement input validation and sanitization on category titles and IDs to prevent injection of malicious SQL code. Employing Web Application Firewalls (WAFs) with rules targeting SQL Injection patterns can provide temporary protection. Restricting privileges for users who can create or rename categories reduces the risk surface. Database accounts used by the application should have the least privileges necessary to limit the impact of a successful injection. Regularly auditing logs for suspicious SQL errors or unusual database activity can help detect exploitation attempts. Additionally, code reviews and static analysis should be performed on customizations or plugins to ensure no similar injection flaws exist. Finally, organizations should monitor WWBN and security advisories for updates or exploit reports related to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T18:30:14.128Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c6c6913c064ed76fdc2961
Added to database: 3/27/2026, 6:04:01 PM
Last enriched: 3/27/2026, 6:06:20 PM
Last updated: 3/28/2026, 12:40:02 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.