CVE-2026-33647Unrestricted File Upload in Avideo

Severity
8.8HIGHNVD
EPSS
0.3%
top 47.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 23
Latest updateMar 25

Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `ImageGallery::saveFile()` method validates uploaded file content using `finfo` MIME type detection but derives the saved filename extension from the user-supplied original filename without an allowlist check. An attacker can upload a polyglot file (valid JPEG magic bytes followed by PHP code) with a `.php` extension. The MIME check passes, but the file is saved as an executable `.php` file in a web-accessibl

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

NVDwwbn/avideo26.0
Packagistwwbn/avideo26.0

Patches

🔴Vulnerability Details

2
GHSA
AVideo Vulnerable to Remote Code Execution via MIME/Extension Mismatch in ImageGallery File Upload2026-03-25
OSV
AVideo Vulnerable to Remote Code Execution via MIME/Extension Mismatch in ImageGallery File Upload2026-03-25

🕵️Threat Intelligence

1
Wiz
CVE-2026-33647 Impact, Exploitability, and Mitigation Steps | Wiz