Path Traversal Vulnerability in WWBN AVideo Open Source Platform
CVE-2026-33513

8.6HIGH

Key Information:

Vendor

Wwbn

Status
Vendor
CVE Published:
23 March 2026

What is CVE-2026-33513?

The WWBN AVideo platform, an open-source video hosting solution, suffers from a significant vulnerability in its API endpoint, specifically the APIName=locale function. This vulnerability allows attackers to exploit an unauthenticated API endpoint, which concatenates user input into a file include path without proper validation or restrictions. As a result, attackers can perform path traversal, enabling them to include arbitrary PHP files located within the web root. Tests confirm that this flaw could lead to unauthorized file disclosure and potential remote code execution if the attacker manages to place malicious PHP files within the directory structure. As of the latest updates, no fixes have been released to address this vulnerability.

Affected Version(s)

AVideo <= 26.0

References

CVSS V3.1

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.