| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-pv87-r9qf-x56p | AVideo has Unauthenticated SQL Injection via JSON Request Bypass in objects/videos.json.php |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 06 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wwbn
Wwbn avideo |
|
| Vendors & Products |
Wwbn
Wwbn avideo |
Fri, 06 Mar 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WWBN AVideo is an open source video platform. Prior to version 24.0, an unauthenticated SQL Injection vulnerability exists in AVideo within the objects/videos.json.php and objects/video.php components. The application fails to properly sanitize the catName parameter when it is supplied via a JSON-formatted POST request body. Because JSON input is parsed and merged into $_REQUEST after global security checks are executed, the payload bypasses the existing sanitization mechanisms. This issue has been patched in version 24.0. | |
| Title | WWBN AVideo: Unauthenticated SQL Injection via JSON Request Bypass in objects/videos.json.php | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-06T16:09:52.823Z
Reserved: 2026-02-27T20:57:47.708Z
Link: CVE-2026-28501
Updated: 2026-03-06T16:01:33.312Z
Status : Received
Published: 2026-03-06T04:16:08.177
Modified: 2026-03-06T04:16:08.177
Link: CVE-2026-28501
No data.
OpenCVE Enrichment
Updated: 2026-03-06T14:56:07Z
Github GHSA