SQL Injection Vulnerability in AVideo Live Streaming Plugin by WWBN
CVE-2026-33485

7.5HIGH

Key Information:

Vendor

Wwbn

Status
Vendor
CVE Published:
23 March 2026

What is CVE-2026-33485?

AVideo, an open-source video platform, contains a vulnerability in versions up to and including 26.0. The RTMP 'on_publish' callback at 'plugin/Live/on_publish.php' is accessible without proper authentication controls, exposing the application to unauthorized access. This flaw allows an attacker to manipulate the '$_POST['name']' parameter, which is used in SQL queries unprotected by parameterized binding or escaping. As a result, attackers can perform time-based blind SQL injection attacks, potentially revealing sensitive database contents, including user passwords and email information. It is crucial for users of AVideo to update to the patched version referenced in the provided commit link to mitigate this risk.

Affected Version(s)

AVideo <= 26.0

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.