WWBN AVideo RCE (CVE-2026-33478)
CVE-2026-33478
WWBN AVideo is an open source video platform. In versions up to and including 26.0, multiple vulnerabilities in AVideo's CloneSite plugin chain together to allow a completely unauthenticated attacker ...
Overview
A critical security vulnerability, tracked as CVE-2026-33478, has been discovered in the WWBN AVideo open-source video platform. This flaw allows an attacker with no prior access or credentials to completely compromise an affected server. The vulnerability resides in the platform’s CloneSite plugin and is present in all versions up to and including 26.0.
Vulnerability Details
The attack chain involves three separate flaws in the CloneSite plugin that, when combined, grant an attacker full control. First, an unauthenticated attacker can access the clones.json.php endpoint to retrieve secret clone keys. Second, using these keys, the attacker can trigger a full database dump via the cloneServer.json.php endpoint. This dump contains administrator password hashes, which are stored using the weak MD5 algorithm and can be cracked quickly.
With a cracked admin password, the attacker gains administrative access to the AVideo platform. Finally, they can exploit an operating system command injection vulnerability within the cloneClient.json.php script. This flaw allows them to inject malicious commands into an rsync command, leading to the execution of arbitrary system commands on the underlying server with the privileges of the web server process.
Impact
The impact of this vulnerability is severe (CVSS score: 10.0). An unauthenticated remote attacker can achieve remote code execution, potentially leading to:
- Full compromise of the AVideo server and its data.
- Theft of sensitive user information and video content.
- Use of the server as a foothold for further attacks within the network.
- Complete system takeover, including data deletion or ransomware deployment.
This level of access could result in significant data breaches. Organizations can review past incidents and their causes in our breach reports section.
Remediation and Mitigation
Immediate action is required to secure affected systems.
- Patch: The primary fix is to update to a patched version of WWBN AVideo released after commit
c85d076375fab095a14170df7ddb27058134d38c. Apply this patch immediately. - Mitigation: If immediate patching is not possible, disable the CloneSite plugin entirely as a critical temporary workaround. This will break the plugin’s functionality but will block all exploitation paths.
- Review: Administrators of affected systems should assume compromise. Review server logs for suspicious activity, audit user accounts, and monitor for unauthorized file changes or processes. Stay informed on emerging threats through our security news portal.
Do not rely on changing admin passwords alone as a fix, as the initial attack vector does not require authentication. The chain of vulnerabilities must be broken by applying the official patch or disabling the vulnerable component.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-33478?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
aws-mcp-server Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication i...
aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authenti...
Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains an OS Command Injection vulnerability in the file move function. The move() function in fileManage.li...
Tianxin Internet Behavior Management System contains a command injection vulnerability in the Reporter component endpoint that allows unauthenticated attackers to execute arbitrary commands by supplyi...