CVE-2026-33770SQL Injection in Avideo

CWE-89SQL Injection4 documents4 sources
Severity
7.1HIGHNVD
EPSS
0.1%
top 82.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
Latest updateMar 26
PublishedMar 27

Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `fixCleanTitle()` static method in `objects/category.php` constructs a SQL SELECT query by directly interpolating both `$clean_title` and `$id` into the query string without using prepared statements or parameterized queries. An attacker who can trigger category creation or renaming with a crafted title value can inject arbitrary SQL. Commit 994cc2b3d802b819e07e6088338e8bf4e484aae4 contains a patch.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Affected Packages2 packages

NVDwwbn/avideo26.0
Packagistwwbn/avideo26.0

Patches

🔴Vulnerability Details

2
GHSA
AVideo has SQL Injection in category.php fixCleanTitle() via Unparameterized clean_title and id Variables2026-03-26
OSV
AVideo has SQL Injection in category.php fixCleanTitle() via Unparameterized clean_title and id Variables2026-03-26

🕵️Threat Intelligence

1
Wiz
CVE-2026-33770 Impact, Exploitability, and Mitigation Steps | Wiz