Cyber Posture

CVE-2026-33681

HighPublic PoC

Published: 23 March 2026

Published
23 March 2026
Modified
25 March 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 28.6th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33681 is a high-severity Path Traversal (CWE-22) vulnerability in Wwbn Avideo. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 4 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of the 'name' parameter to block path traversal sequences, directly preventing execution of arbitrary install.sql files as SQL queries.

prevent

SI-2 ensures timely remediation of the path traversal flaw via the patch in commit 81b591c, eliminating the vulnerability in affected AVideo versions.

prevent

AC-6 least privilege limits administrative access to the vulnerable pluginRunDatabaseScript endpoint, reducing direct exploitation and CSRF risks against admins.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
T1485 Data Destruction Impact
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.
T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
Why these techniques?

Path traversal in public-facing web app endpoint enables T1190 exploitation (direct or via CSRF); requires/uses valid admin accounts (T1078); directly allows arbitrary SQL execution against DB for data access (T1213.006), destruction (T1485), and stored data manipulation (T1565.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `objects/pluginRunDatabaseScript.json.php` endpoint accepts a `name` parameter via POST and passes it to `Plugin::getDatabaseFileName()` without any path traversal sanitization. This allows an authenticated admin (or…

more

an attacker via CSRF) to traverse outside the plugin directory and execute the contents of any `install/install.sql` file on the filesystem as raw SQL queries against the application database. Commit 81b591c509835505cb9f298aa1162ac64c4152cb contains a patch.

Deeper analysisAI

CVE-2026-33681 is a path traversal vulnerability (CWE-22) affecting WWBN AVideo, an open source video platform, in versions up to and including 26.0. The issue resides in the `objects/pluginRunDatabaseScript.json.php` endpoint, which accepts a `name` parameter via POST and passes it unsanitized to the `Plugin::getDatabaseFileName()` function. This flaw enables attackers to navigate outside the intended plugin directory and access arbitrary `install/install.sql` files on the filesystem, executing their contents as raw SQL queries directly against the application's database.

Exploitation requires high privileges, as indicated by the CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). An authenticated administrator can directly trigger the endpoint to achieve SQL injection-like effects by supplying a crafted `name` parameter with traversal sequences (e.g., `../`). Alternatively, an unauthenticated attacker could exploit this via cross-site request forgery (CSRF) if targeting an admin user, potentially leading to unauthorized database modifications, data exfiltration, or destruction depending on the contents of accessible `install.sql` files.

The vulnerability is addressed in commit 81b591c509835505cb9f298aa1162ac64c4152cb, available on the WWBN/AVideo GitHub repository, which patches the path traversal issue. Additional details and mitigation guidance are provided in the GitHub Security Advisory GHSA-3hwv-x8g3-9qpr. Security practitioners should urge AVideo users to update to a patched version beyond 26.0 and review access controls for admin endpoints to prevent CSRF abuse.

Details

CWE(s)

Affected Products

wwbn
avideo
≤ 26.0

CVEs Like This One

CVE-2026-33293Same product: Wwbn Avideo
CVE-2026-33292Same product: Wwbn Avideo
CVE-2026-41058Same product: Wwbn Avideo
CVE-2026-40909Same product: Wwbn Avideo
CVE-2026-33493Same product: Wwbn Avideo
CVE-2026-39369Same product: Wwbn Avideo
CVE-2026-33513Same product: Wwbn Avideo
CVE-2026-33352Same product: Wwbn Avideo
CVE-2026-33485Same product: Wwbn Avideo
CVE-2026-34374Same product: Wwbn Avideo

References