CVE-2026-33717
Received Received - Intake
Persistent PHP File Upload Vulnerability in WWBN AVideo Encoder

Publication date: 2026-03-23

Last updated on: 2026-03-25

Assigner: GitHub, Inc.

Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `downloadVideoFromDownloadURL()` function in `objects/aVideoEncoder.json.php` saves remote content to a web-accessible temporary directory using the original URL's filename and extension (including `.php`). By providing an invalid `resolution` parameter, an attacker triggers an early `die()` via `forbiddenPage()` before the temp file can be moved or cleaned up, leaving an executable PHP file persistently accessible under the web root at `videos/cache/tmpFile/`. Commit 6da79b43484099a0b660d1544a63c07b633ed3a2 contains a patch.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-23
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2026-03-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wwbn avideo to 26.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-33717 is a high-severity Remote Code Execution (RCE) vulnerability in the WWBN AVideo platform affecting versions up to 26.0. The issue arises in the function downloadVideoFromDownloadURL() which downloads remote files to a web-accessible temporary directory using the original filename and extension from the URL, including potentially dangerous .php files.

If an attacker provides an invalid resolution parameter, the function triggers an early termination before the temporary file is moved or deleted. This leaves the malicious PHP file persistently accessible under the web root, allowing the attacker to execute arbitrary PHP code by accessing the file directly.

The vulnerability requires an authenticated user with upload permissions to exploit, who can upload a PHP webshell and trigger the flaw with a specially crafted request.


How can this vulnerability impact me? :

This vulnerability allows authenticated users with upload rights to execute arbitrary PHP code remotely on the server hosting the AVideo platform.

  • Full server compromise, including reading and writing files.
  • Execution of system commands.
  • Access to database credentials.
  • Lateral movement within the network.
  • Destruction or modification of platform content.

The attack requires only one HTTP request plus hosting the malicious payload and leaves minimal traces in normal logs.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking for the presence of unexpected or suspicious PHP files in the web-accessible temporary directory located at videos/cache/tmpFile/. Since the vulnerability leaves executable PHP files accessible under this directory, scanning for such files can help identify exploitation.'}, {'type': 'paragraph', 'content': 'You can use commands to list PHP files in the vulnerable directory, for example:'}, {'type': 'list_item', 'content': "find /path/to/avideo/videos/cache/tmpFile/ -type f -name '*.php'"}, {'type': 'paragraph', 'content': 'Additionally, monitoring HTTP access logs for requests to files under videos/cache/tmpFile/ with .php extensions may reveal attempts to execute malicious payloads.'}, {'type': 'paragraph', 'content': 'Since the attack requires an authenticated user with upload permissions, reviewing upload activity logs and looking for unusual or invalid resolution parameters in requests to the downloadVideoFromDownloadURL() endpoint can also help detect exploitation attempts.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Apply the patch from commit 6da79b43484099a0b660d1544a63c07b633ed3a2 which adds validation of the resolution parameter before downloading and validates the file extension of the download URL against a whitelist to prevent saving dangerous files.
  • Add a .htaccess file in the videos/cache/tmpFile/ directory to deny execution of PHP and related script files, effectively disabling PHP execution in that directory.
  • Restrict upload permissions to trusted users only, as exploitation requires authenticated users with upload rights.
  • Monitor the temporary directory for any unexpected PHP files and remove them immediately.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart