Remote Code Execution Vulnerability in WWBN AVideo Platform
CVE-2026-33647

8.8HIGH

Key Information:

Vendor

Wwbn

Status
Vendor
CVE Published:
23 March 2026

What is CVE-2026-33647?

WWBN AVideo, an open-source video platform, is affected by a vulnerability present in versions up to 26.0 involving improper file validation. The ImageGallery::saveFile() method utilizes finfo MIME type detection for validating uploaded files but fails to properly check the original filename provided by users against an allowlist. This oversight permits attackers to upload polyglot files containing both valid JPEG magic bytes and PHP code, which are then saved as executable .php files in publicly accessible directories, leading to potential Remote Code Execution. A patch addressing this vulnerability can be found in commit 345a8d3ece0ad1e1b71a704c1579cbf885d8f3ae.

Affected Version(s)

AVideo <= 26.0

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.