CVE-2026-33717Unrestricted File Upload in Avideo

Severity
8.8HIGHNVD
EPSS
0.1%
top 84.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 23
Latest updateMar 25

Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `downloadVideoFromDownloadURL()` function in `objects/aVideoEncoder.json.php` saves remote content to a web-accessible temporary directory using the original URL's filename and extension (including `.php`). By providing an invalid `resolution` parameter, an attacker triggers an early `die()` via `forbiddenPage()` before the temp file can be moved or cleaned up, leaving an executable PHP file persistently acce

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

NVDwwbn/avideo26.0
Packagistwwbn/avideo26.0

Patches

🔴Vulnerability Details

2
GHSA
AVideo: Remote Code Execution via PHP Temp File in Encoder downloadURL2026-03-25
OSV
AVideo: Remote Code Execution via PHP Temp File in Encoder downloadURL2026-03-25

🕵️Threat Intelligence

1
Wiz
CVE-2026-33717 Impact, Exploitability, and Mitigation Steps | Wiz