PHP RCE (CVE-2026-33351)
CVE-2026-33351
WWBN AVideo is an open source video platform. Prior to version 26.0, a Server-Side Request Forgery (SSRF) vulnerability exists in `plugin/Live/standAloneFiles/saveDVR.json.php`. When the AVideo Live p...
Overview
A critical security vulnerability, identified as CVE-2026-33351, has been discovered in WWBN AVideo, an open-source video platform. This flaw is a Server-Side Request Forgery (SSRF) that affects systems running the AVideo Live plugin in its standalone configuration. If exploited, it could allow an attacker to compromise the server.
Vulnerability Details
In simple terms, this vulnerability exists in a specific file (saveDVR.json.php) used by the Live plugin. The flaw allows an attacker to trick the AVideo server into making web requests to locations it should not access. This is possible because the software uses unvalidated user input-specifically the webSiteRootURL parameter-to build a URL that the server then fetches data from. No authentication or checks are performed to ensure the request is legitimate, making it easy to exploit.
Impact
The impact of this SSRF vulnerability is severe (CVSS score: 9.1). A successful attack could allow a remote, unauthenticated attacker to:
- Make requests to the server’s own internal systems that are normally hidden behind a firewall (like databases or administrative interfaces).
- Probe the internal network to map out services for further attacks.
- Potentially access sensitive data from internal services or cloud metadata, which could lead to a full system compromise. Such breaches can result in significant data loss and operational disruption. For context on the real-world impact of data exposure, you can review recent incidents in our breach reports.
Remediation and Mitigation
The primary and most effective action is to update your WWBN AVideo installation immediately.
1. Patch Immediately: Upgrade to WWBN AVideo version 26.0 or later. This version contains the necessary fix to properly validate requests and prevent SSRF exploitation. Always obtain software updates directly from the official project repository.
2. Temporary Mitigation (If Patching is Delayed): If an immediate update is not possible, consider disabling the affected Live plugin component or restricting network access to the AVideo server at the firewall level to block unexpected outbound requests. These are temporary measures and do not replace the need to apply the official patch.
3. General Security Hygiene: This incident underscores the importance of keeping all software components up to date. Regularly review and apply security patches for your entire software stack. For ongoing updates on vulnerabilities and threats, follow our security news section.
Organizations using WWBN AVideo should treat this as a high-priority update due to the critical nature and ease of exploitation of this flaw.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-33351?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
WWBN AVideo is an open source video platform. Prior to version 26.0, the `setPassword.json.php` endpoint in the CustomizeUser plugin allows administrators to set a channel password for any user. Due t...
WWBN AVideo is an open source video platform. Prior to version 26.0, an unauthenticated SQL injection vulnerability exists in `objects/category.php` in the `getAllCategories()` method. The `doNotShowC...
WWBN AVideo is an open source video platform. In versions up to and including 26.0, an unauthenticated server-side request forgery vulnerability in `plugin/Live/test.php` allows any remote user to mak...
Server-side request forgery (ssrf) in Azure Custom Locations Resource Provider (RP) allows an authorized attacker to elevate privileges over a network....
Other Wwbn Avideo Vulnerabilities
WWBN AVideo is an open source video platform. Prior to version 26.0, the `setPassword.json.php` endpoint in the CustomizeUser plugin allows administrators to set a channel password for any user. Due t...
WWBN AVideo is an open source video platform. Prior to version 26.0, an unauthenticated SQL injection vulnerability exists in `objects/category.php` in the `getAllCategories()` method. The `doNotShowC...