Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the RTMP `on_publish` callback at `plugin/Live/on_publish.php` is accessible without authentication. The `$_POST['name']` parameter (stream key) is interpolated directly into SQL queries in two locations — `LiveTransmitionHistory::getLatest()` and `LiveTransmition::keyExists()` — without parameterized binding or escaping. An unauthenticated attacker can exploit time-based blind SQL injection to extract all database contents including user password hashes, email addresses, and other sensitive data. Commit af59eade82de645b20183cc3d74467a7eac76549 contains a patch.
Published: 2026-03-23
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Data Exfiltration via Blind SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The error occurs when an attacker supplies a crafted stream name during the RTMP on_publish callback. The application directly interpolates the stream key into two SQL statements within LiveTransmitionHistory::getLatest() and LiveTransmition::keyExists() without parameter binding or escaping. This results in a time‑based blind SQL injection that can be leveraged by an unauthenticated user to read every row from the database, including password hashes and email addresses. Because the data is publicly available to anyone who can initiate an RTMP publish request, the confidentiality of user accounts is fully compromised.

Affected Systems

The vulnerability affects the WWBN AVideo platform, versions up to and including 26.0. Any deployment of these versions that exposes the RTMP on_publish endpoint without authentication is at risk. Upgrading to a version that includes the patch in commit af59eade82de645b20183cc3d74467a7eac76549 removes the flaw.

Risk and Exploitability

The CVSS score of 7.5 classifies the issue as high severity. EPSS indicates the probability of exploitation is less than 1%, and the vulnerability has not been reported in the CISA KEV catalog. The attack vector is unauthenticated and remote, requiring only the ability to send an RTMP publish request. Because it is a blind injection, an attacker can perform a time‑based extraction without immediate feedback, making automated exploitation more tedious but still feasible for a determined adversary. Users with remote RTMP access are therefore at a significant risk until the patch is applied.

Generated by OpenCVE AI on March 24, 2026 at 19:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade AVideo to a version newer than 26.0 that includes the patch in commit af59eade82de645b20183cc3d74467a7eac76549
  • If an upgrade is unavailable, restrict access to the RTMP on_publish endpoint so that only authenticated clients can reach it
  • Consider disabling the Live Transmition plugin or removing the on_publish callback entirely if RTMP streaming is not used
  • Monitor database logs for suspicious slow queries that may indicate ongoing attempts to exploit the injection

Generated by OpenCVE AI on March 24, 2026 at 19:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-8p58-35c3-ccxx AVideo has an Unauthenticated Blind SQL Injection in RTMP on_publish Callback via Stream Name Parameter
History

Wed, 25 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Wwbn
Wwbn avideo
Vendors & Products Wwbn
Wwbn avideo

Mon, 23 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Description WWBN AVideo is an open source video platform. In versions up to and including 26.0, the RTMP `on_publish` callback at `plugin/Live/on_publish.php` is accessible without authentication. The `$_POST['name']` parameter (stream key) is interpolated directly into SQL queries in two locations — `LiveTransmitionHistory::getLatest()` and `LiveTransmition::keyExists()` — without parameterized binding or escaping. An unauthenticated attacker can exploit time-based blind SQL injection to extract all database contents including user password hashes, email addresses, and other sensitive data. Commit af59eade82de645b20183cc3d74467a7eac76549 contains a patch.
Title AVideo has an Unauthenticated Blind SQL Injection in RTMP on_publish Callback via Stream Name Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-25T14:17:20.198Z

Reserved: 2026-03-20T16:16:48.971Z

Link: CVE-2026-33485

cve-icon Vulnrichment

Updated: 2026-03-25T14:16:44.720Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-23T15:16:34.887

Modified: 2026-03-24T18:35:45.310

Link: CVE-2026-33485

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T21:28:00Z

Weaknesses