CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2026-33717
8.80.04%

CVE-2026-33717: Remote Code Execution in WWBN AVideo via Persistent PHP File Upload

Alon Barad
Alon Barad
Software Engineer

Mar 25, 2026·5 min read·4 visits

Weaponized

Executive Summary (TL;DR)

Authenticated attackers can upload and execute arbitrary PHP code by exploiting a logic flaw in the video fetching mechanism of WWBN AVideo <= 26.0.

WWBN AVideo versions up to and including 26.0 are vulnerable to authenticated Remote Code Execution (RCE) via an unrestricted file upload flaw. The vulnerability involves improper error handling during remote video fetching, allowing an attacker to bypass file cleanup routines and persistently store malicious PHP scripts in a web-accessible directory.

Vulnerability Overview

WWBN AVideo up to version 26.0 contains a high-severity vulnerability (CVE-2026-33717) allowing authenticated attackers to execute arbitrary code. The flaw resides in the file download functionality utilized by the video encoder module.

The application fetches remote files specified by user-supplied URLs and stores them locally in a web-accessible cache directory. It performs file type validation operations after writing the file to disk rather than before.

A specific error-handling logic flaw allows attackers to force the script to terminate prematurely before the temporary file is deleted. This failure to execute cleanup routines leaves the malicious payload permanently accessible via the web server.

Root Cause Analysis

The underlying bug class is CWE-434: Unrestricted Upload of File with Dangerous Type, combined with improper error handling. The vulnerable function downloadVideoFromDownloadURL() within objects/aVideoEncoder.json.php processes user-supplied download URLs.

When a user requests a remote download, the server immediately writes the contents of the remote file into the videos/cache/tmpFile/ directory. The application uses the original filename and extension derived from the URL via the PHP basename() function. No initial validation restricts the file extension during this initial write operation.

Following the file write, the application evaluates the user-supplied resolution parameter. If the parameter contains an invalid string, the application invokes the forbiddenPage() function. This function executes a die() statement, abruptly terminating the PHP process.

Because the script exits prematurely, the execution flow never reaches the cleanup routines responsible for moving or deleting the temporary file. The lack of cleanup renders the downloaded file persistent within the web-accessible directory.

Code Analysis

The vulnerable implementation relies entirely on post-download validation. The script downloads the file to the temporary directory and subsequently validates parameters like the video resolution. If validation fails, process termination prevents file cleanup.

The official patch addresses this by reordering the validation logic and implementing an explicit extension allowlist. Input validation now occurs prior to any file I/O operations.

// File: objects/aVideoEncoder.json.php
// 1. Move resolution validation to before the download
if (!empty($_REQUEST['resolution']) && !in_array($_REQUEST['resolution'], $global['avideo_possible_resolutions'])) {
    $msg = "This resolution is not possible {$_REQUEST['resolution']}";
    forbiddenPage($msg); // die() here is now safe because no file is created yet
}
 
// 2. Validate extension inside download function
function downloadVideoFromDownloadURL($downloadURL) {
    // ...
    $urlExtension = strtolower(pathinfo(parse_url($downloadURL, PHP_URL_PATH), PATHINFO_EXTENSION));
    if (!in_array($urlExtension, $global['allowedExtension'])) {
        __errlog("Extension not allowed: " . $urlExtension);
        return false;
    }
    // ... proceed to download
}

The implementation of in_array($urlExtension, $global['allowedExtension']) ensures that only explicitly permitted file types are written to disk, comprehensively eliminating the CWE-434 vector.

Exploitation Methodology

Exploitation requires a user account with minimal privileges, specifically standard user or encoder permissions. The attacker needs secondary server infrastructure to host the initial payload.

The attacker hosts a malicious PHP script on their controlled infrastructure. They then transmit a direct request to the objects/aVideoEncoder.json.php endpoint on the target AVideo server.

The request must contain two specific parameters: a downloadURL pointing to the malicious PHP script and a resolution parameter containing an explicitly invalid value. The target server fetches the PHP file and writes it to the videos/cache/tmpFile/ directory.

The invalid resolution parameter forces the application to evaluate the input and call forbiddenPage(). The script aborts, leaving the PHP file in the temporary directory. The attacker subsequently accesses the file via a predictable URL path to achieve code execution.

Impact Assessment

Successful exploitation yields arbitrary remote code execution within the context of the web server service account. This grants the attacker comprehensive control over the application environment and direct filesystem access.

The attacker gains read and write access to the application database credentials, configuration files, and stored media. This constitutes a complete loss of confidentiality and integrity according to the CVSS v3.1 scoring framework.

The vulnerability carries a CVSS v3.1 base score of 8.8. The attack complexity is low, and no user interaction is required. The requirement for low-level authentication prevents this vulnerability from reaching a 9.8 critical severity rating.

Remediation and Mitigation

Organizations operating WWBN AVideo must upgrade to version 26.1 or later. The patch completely eliminates the vulnerability by validating input before allocating storage and strictly limiting allowed file extensions.

If immediate patching is not technically feasible, administrators can apply mitigation controls at the web server layer. Configuring Nginx or Apache to deny execution of PHP scripts within the /videos/cache/ directory structure neutralizes the exploit.

Administrators should monitor web server access logs for anomalous requests to objects/aVideoEncoder.json.php. Requests featuring unusual or malformed resolution parameters alongside remote downloadURL inputs strongly indicate exploitation attempts.

Official Patches

WWBNOfficial patch fixing the unrestricted file upload and error handling flow.

Fix Analysis (1)

Technical Appendix

CVSS Score
8.8/ 10
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
0.04%

Affected Systems

WWBN AVideo <= 26.0PHP Web Server Environments hosting AVideo

Affected Versions Detail

Product
Affected Versions
Fixed Version
AVideo
WWBN
<= 26.026.1
AttributeDetail
CWE IDCWE-434
Attack VectorNetwork
CVSS v3.18.8
EPSS0.04%
ImpactHigh (RCE)
Exploit StatusWeaponized
KEV StatusNot Listed

MITRE ATT&CK Mapping

T1105Ingress Tool Transfer
Command and Control
T1059Command and Scripting Interpreter
Execution
CWE-434
Unrestricted Upload of File with Dangerous Type

Unrestricted Upload of File with Dangerous Type

Vulnerability Timeline

Vulnerability disclosed and published on CVE and GitHub Advisory databases
2026-03-23
Official patch released by WWBN developers
2026-03-23
Detailed technical analysis published by security researchers (TheHackerWire)
2026-03-23
Research report finalized
2026-03-25

References & Sources

  • [1]GitHub Security Advisory: GHSA-8wf4-c4x3-h952
  • [2]WWBN AVideo Patch Commit
  • [3]TheHackerWire Technical Write-up

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.