Remote Code Execution Vulnerability in WWBN AVideo Platform
CVE-2026-33507

8.8HIGH

Key Information:

Vendor

Wwbn

Status
Vendor
CVE Published:
23 March 2026

What is CVE-2026-33507?

WWBN AVideo, an open source video platform, presents a vulnerability that enables admin users to upload unverified plugin ZIP files through the objects/pluginImport.json.php endpoint. This endpoint lacks CSRF protection, allowing an attacker to exploit it by crafting a malicious page. If an authenticated admin visits the page, the attacker can silently install a malicious plugin containing PHP code—potentially leading to Remote Code Execution on the server. It is recommended to upgrade to patched versions to mitigate this risk.

Affected Version(s)

AVideo <= 26.0

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.