CVE-2026-33478

WWBN · AVideo

WWBN AVideo contains a vulnerability chain allowing unauthenticated remote code execution via exposed clone secrets, database dumps, and OS command injection.

Executive summary

The WWBN AVideo platform is subject to a critical vulnerability chain that allows unauthenticated attackers to achieve full remote code execution and system takeover.

Vulnerability

This is a multi-step exploit chain. First, clones.json.php leaks secret keys. These keys allow unauthenticated database dumps via cloneServer.json.php. Attackers can then crack MD5 hashes to gain admin access and finally exploit an OS command injection in the rsync command construction.

Business impact

This vulnerability represents the highest possible risk (CVSS 10.0). An attacker can gain total control over the video platform, access all private content, steal user credentials, and execute arbitrary commands on the underlying host. The ability to dump the entire database unauthenticated makes this an extremely dangerous flaw for data privacy.

Remediation

Immediate Action: Apply the patch provided in commit c85d076375fab095a14170df7ddb27058134d38c or update to the latest version of AVideo.

Proactive Monitoring: Check for unauthorized access to .json.php files in the CloneSite plugin directory and monitor for unusual rsync processes on the server.

Compensating Controls: Disable the CloneSite plugin if it is not strictly required for business operations and restrict access to the administration interface.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Given the CVSS 10.0 rating, this is a "patch now" priority. Administrators must update the software immediately and should consider rotating all administrative passwords and secret keys, as they may have been compromised.