Cyber Posture

CVE-2026-33025

High

Published: 20 March 2026

Published
20 March 2026
Modified
24 March 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 2.9th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33025 is a high-severity SQL Injection (CWE-89) vulnerability in Wwbn Avideo-Encoder. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 2.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of untrusted inputs like $_POST['sort'] array keys to ensure they conform to safe SQL identifier syntax, directly preventing identifier-based SQL injection.

prevent

Mandates timely remediation of identified flaws such as this SQL injection vulnerability through patching to AVideo version 8.0.

prevent

Enforces restrictions on information inputs at system interfaces, such as whitelisting valid characters [A-Za-z0-9_] for sort keys to block malicious SQL identifiers.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing AVideo web app (getSqlFromPost) directly maps to T1190 for exploitation by authenticated users; arbitrary SQL execution on the backend database enables T1213.006 for data collection/modification from information repositories.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

AVideo is a video-sharing Platform. Versions prior to 8.0 contain a SQL Injection vulnerability in the getSqlFromPost() method of Object.php. The $_POST['sort'] array keys are used directly as SQL column identifiers inside an ORDER BY clause. Although real_escape_string() was applied,…

more

it only escapes string-context characters (quotes, null bytes) and provides no protection for SQL identifiers — making it entirely ineffective here. This issue has been fixed in version 8.0. To workaround this issue without upgrading, operators can apply a WAF rule to block POST requests where any sort[*] key contains characters outside [A-Za-z0-9_]. Alternatively, restrict access to the queue view (queue.json.php, index.php) to trusted IP ranges only.

Deeper analysisAI

CVE-2026-33025 is a SQL injection vulnerability (CWE-89) in AVideo, an open-source video-sharing platform. It affects versions prior to 8.0 and is located in the getSqlFromPost() method of the Object.php file. The vulnerability arises because keys from the $_POST['sort'] array are directly used as SQL column identifiers within an ORDER BY clause. While real_escape_string() is applied to these keys, it only escapes string-context characters like quotes and null bytes, offering no protection against SQL identifier injection.

The vulnerability has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating exploitation over the network with low complexity by low-privileged users, such as authenticated account holders, without requiring user interaction. Attackers can achieve high impacts on confidentiality, integrity, and availability, potentially allowing arbitrary SQL execution to extract data, modify records, or disrupt services.

The issue was fixed in AVideo version 8.0, as detailed in the GitHub security advisory (GHSA-5qvj-5h75-27pj) and corresponding commit (d1c8a17ac88b5e27da9dfb7a230bbaf54aa53124). Without upgrading, mitigation includes deploying a WAF rule to block POST requests where any sort[*] key contains characters outside [A-Za-z0-9_], or restricting access to the affected endpoints (queue.json.php and index.php) to trusted IP ranges.

Details

CWE(s)

Affected Products

wwbn
avideo-encoder
≤ 8.0

CVEs Like This One

CVE-2026-29058Same product: Wwbn Avideo-Encoder
CVE-2026-33024Same product: Wwbn Avideo-Encoder
CVE-2026-33723Same vendor: Wwbn
CVE-2026-33485Same vendor: Wwbn
CVE-2026-34374Same vendor: Wwbn
CVE-2026-33651Same vendor: Wwbn
CVE-2026-33352Same vendor: Wwbn
CVE-2026-28501Same vendor: Wwbn
CVE-2026-33770Same vendor: Wwbn
CVE-2026-33767Same vendor: Wwbn

References