CVE-2026-33352SQL Injection in Avideo

CWE-89SQL Injection4 documents4 sources
Severity
9.8CRITICALNVD
EPSS
0.0%
top 88.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
Latest updateMar 19
PublishedMar 23

Description

WWBN AVideo is an open source video platform. Prior to version 26.0, an unauthenticated SQL injection vulnerability exists in `objects/category.php` in the `getAllCategories()` method. The `doNotShowCats` request parameter is sanitized only by stripping single-quote characters (`str_replace("'", '', ...)`), but this is trivially bypassed using a backslash escape technique to shift SQL string boundaries. The parameter is not covered by any of the application's global input filters in `objects/sec

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

NVDwwbn/avideo< 26.0
Packagistwwbn/avideo26.0

Patches

🔴Vulnerability Details

2
OSV
AVideo has an Unauthenticated SQL Injection via `doNotShowCats` Parameter (Backslash Escape Bypass)2026-03-19
GHSA
AVideo has an Unauthenticated SQL Injection via `doNotShowCats` Parameter (Backslash Escape Bypass)2026-03-19

🕵️Threat Intelligence

1
Wiz
CVE-2026-33352 Impact, Exploitability, and Mitigation Steps | Wiz