SQL Injection Vulnerability in WWBN AVideo Open Source Video Platform
CVE-2026-33651

8.1HIGH

Key Information:

Vendor

Wwbn

Status
Vendor
CVE Published:
23 March 2026

What is CVE-2026-33651?

WWBN AVideo, an open-source video platform, has a vulnerability in its remindMe.json.php endpoint. This issue arises when the live_schedule_id parameter is passed through several functions without appropriate sanitization. Although some functions apply intval() to local copies, the original unsanitized variable remains unchanged. This flaw allows authenticated users to exploit time-based blind SQL injection attacks, potentially enabling unauthorized access to sensitive database information. It is crucial that users upgrade to the patched version as detailed in the latest commit.

Affected Version(s)

AVideo <= 26.0

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.