CVE-2026-33767SQL Injection in Avideo

CWE-89SQL Injection4 documents4 sources
Severity
7.1HIGHNVD
EPSS
0.1%
top 83.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
Latest updateMar 26
PublishedMar 27

Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, in `objects/like.php`, the `getLike()` method constructs a SQL query using a prepared statement placeholder (`?`) for `users_id` but directly concatenates `$this->videos_id` into the query string without parameterization. An attacker who can control the `videos_id` value (via a crafted request) can inject arbitrary SQL, bypassing the partial prepared-statement protection. Commit 0215d3c4f1ee748b8880254967b51784b8

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Packages2 packages

Packagistwwbn/avideo< 26.0
NVDwwbn/avideo26.0

Patches

🔴Vulnerability Details

2
GHSA
AVideo has SQL Injection via Partial Prepared Statement — videos_id Concatenated Directly into Query2026-03-26
OSV
AVideo has SQL Injection via Partial Prepared Statement — videos_id Concatenated Directly into Query2026-03-26

🕵️Threat Intelligence

1
Wiz
CVE-2026-33767 Impact, Exploitability, and Mitigation Steps | Wiz