Php RCE Vulnerability (CVE-2026-28501)
CVE-2026-28501
WWBN AVideo is an open source video platform. Prior to version 24.0, an unauthenticated SQL Injection vulnerability exists in AVideo within the objects/videos.json.php and objects/video.php components...
Overview
A critical security vulnerability has been identified in WWBN AVideo, an open-source video platform. This flaw allows an unauthenticated attacker to perform SQL Injection attacks, potentially giving them complete control over the affected database and application.
Vulnerability Details
In versions prior to 24.0, the AVideo platform contains a significant security weakness in two key components: objects/videos.json.php and objects/video.php. The vulnerability stems from how the application handles the catName parameter when it is sent within a JSON-formatted POST request.
Normally, the application has security checks to sanitize user input and prevent SQL injection. However, due to a flaw in the processing order, JSON data is merged into the application’s request variables after these global security checks have already run. This means malicious SQL code hidden within a JSON payload bypasses all existing protections, allowing it to reach and manipulate the database directly.
Potential Impact
The impact of this vulnerability is severe. An attacker exploiting this flaw can:
- Access, modify, or delete any data in the application’s database, including user credentials, video metadata, and system configurations.
- Compromise the underlying server, potentially leading to a full system takeover.
- Disrupt service availability by corrupting or destroying database contents.
Because the attack requires no authentication (unauthenticated), it is especially dangerous and easy to exploit.
Remediation and Mitigation
The primary and definitive solution is to upgrade immediately to AVideo version 24.0 or later, where the vendor has released a patch to correct this vulnerability.
Immediate Action Steps:
- Upgrade: All users of WWBN AVideo must upgrade their installation to version 24.0 without delay.
- Verify: Confirm that your deployment is running the patched version. The vulnerability affects all versions prior to 24.0.
- Monitor: Review application and database logs for any suspicious activity or unexpected SQL queries, particularly those targeting the affected components.
If an immediate upgrade is not possible, consider implementing a Web Application Firewall (WAF) with rules to block SQL injection patterns as a temporary, secondary mitigation. However, this is not a substitute for applying the official patch.
For administrators, this serves as a reminder to maintain a regular patch management schedule for all software components, especially publicly accessible web applications.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-28501?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Metasploit Modules
Weaponized exploit code — authorized use only
The Metasploit Framework modules below are production-ready exploit code maintained by Rapid7. Unlike random GitHub PoCs, these are vetted by Metasploit maintainers and integrated into a point-and-click exploitation framework used by red teams worldwide. The presence of an MSF module means this CVE is trivially exploitable at scale — patch immediately.
Authorized use only. Run only against systems you own or have explicit written permission to test. Using exploit code against systems you do not own is illegal in most jurisdictions and violates Yazoul's terms of use.
| Module | Source |
|---|---|
auxiliary/gather/avideo_catname_sqli | View source |
1 Metasploit module indexed for this CVE. Source: rapid7/metasploit-framework.
Related Advisories
WeGIA is a web manager for charitable institutions. Prior to version 3.6.6, a critical SQL injection vulnerability exists in the WeGIA application. The remover_produto_ocultar.php script uses extract(...
CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection in print_membership_card.php via the ID parameter....
code-projects Community Project Scholars Tracking System 1.0 is vulnerable to SQL Injection in the admin user management endpoints /admin/save_user.php and /admin/update_user.php. These endpoints lack...
Jettweb PHP Hazir Rent A Car Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the arac_kateg...
Other PHP Vulnerabilities
Jettweb PHP Hazir Rent A Car Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the arac_kateg...
Jettweb Php Hazir Ilan Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'kat' parameter....
Jettweb PHP Hazir Haber Sitesi Scripti V2 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting ...
Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the videoid paramet...