CVE-2026-33478
WWBN · AVideo
WWBN AVideo contains a vulnerability chain allowing unauthenticated remote code execution via exposed clone secrets, database dumps, and OS command injection.
Executive summary
The WWBN AVideo platform is subject to a critical vulnerability chain that allows unauthenticated attackers to achieve full remote code execution and system takeover.
Vulnerability
This is a multi-step exploit chain. First, clones.json.php leaks secret keys. These keys allow unauthenticated database dumps via cloneServer.json.php. Attackers can then crack MD5 hashes to gain admin access and finally exploit an OS command injection in the rsync command construction.
Business impact
This vulnerability represents the highest possible risk (CVSS 10.0). An attacker can gain total control over the video platform, access all private content, steal user credentials, and execute arbitrary commands on the underlying host. The ability to dump the entire database unauthenticated makes this an extremely dangerous flaw for data privacy.
Remediation
Immediate Action: Apply the patch provided in commit c85d076375fab095a14170df7ddb27058134d38c or update to the latest version of AVideo.
Proactive Monitoring: Check for unauthorized access to .json.php files in the CloneSite plugin directory and monitor for unusual rsync processes on the server.
Compensating Controls: Disable the CloneSite plugin if it is not strictly required for business operations and restrict access to the administration interface.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Given the CVSS 10.0 rating, this is a "patch now" priority. Administrators must update the software immediately and should consider rotating all administrative passwords and secret keys, as they may have been compromised.