Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the restreamer endpoint constructs a log file path by embedding user-controlled `users_id` and `liveTransmitionHistory_id` values from the JSON request body without any sanitization. This log file path is then concatenated directly into shell commands passed to `exec()`, allowing an authenticated user to achieve arbitrary command execution on the server via shell metacharacters such as `$()` or backticks. Commit 99b865413172045fef6a98b5e9bfc7b24da11678 contains a patch.
Published: 2026-03-23
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

AVideo's restreamer endpoint enables arbitrary OS command execution by ignoring user-supplied values used to build a shell command. An attacker who can authenticate to the API can inject shell meta‑characters in the JSON body fields `users_id` and `liveTransmitionHistory_id`, causing the server to execute commands via exec(). This flaw is an instance of OS Command Injection (CWE‑78), allowing complete compromise of confidentiality, integrity and availability of the host.

Affected Systems

Version 26.0 and earlier of the WWBN AVideo open‑source video platform are affected. Any installation using these releases is vulnerable when the restreamer API is exposed to authenticated users. The vulnerability is specific to the restreamer component and only impacts systems that host the AVideo service.

Risk and Exploitability

The CVSS score of 8.8 classifies the flaw as High severity. The EPSS score indicates a low probability of exploitation (<1%), and it is not yet listed in CISA’s KEV catalog. Nonetheless, exploitation requires only authenticated access to the restreamer endpoint, which is commonly available to content creators and administrators. An attacker could gain shell access, modify files, install malware or exfiltrate data. Until a patch is applied, the risk remains appreciable, especially if the endpoint is exposed to the internet.

Generated by OpenCVE AI on March 25, 2026 at 20:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch referenced in commit 99b865413172045fef6a98b5e9bfc7b24da11678.
  • Upgrade to AVideo version 27.0 or later, which removes the unsanitized log path construction.
  • If an upgrade is not immediately possible, restrict access to the restreamer endpoint to trusted users or IP addresses and enforce least privilege.
  • As an interim workaround, modify the application to sanitize `users_id` and `liveTransmitionHistory_id` before using them in file paths or replace `exec()` with a safer alternative.
  • Monitor server logs for unexpected shell command usage and audit for signs of compromise.

Generated by OpenCVE AI on March 25, 2026 at 20:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5m4q-5cvx-36mw AVideo Vulnerable to OS Command Injection via Unsanitized `users_id` and `liveTransmitionHistory_id` in Restreamer Log File Path
History

Wed, 25 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

Wed, 25 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Wwbn
Wwbn avideo
Vendors & Products Wwbn
Wwbn avideo

Mon, 23 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Description WWBN AVideo is an open source video platform. In versions up to and including 26.0, the restreamer endpoint constructs a log file path by embedding user-controlled `users_id` and `liveTransmitionHistory_id` values from the JSON request body without any sanitization. This log file path is then concatenated directly into shell commands passed to `exec()`, allowing an authenticated user to achieve arbitrary command execution on the server via shell metacharacters such as `$()` or backticks. Commit 99b865413172045fef6a98b5e9bfc7b24da11678 contains a patch.
Title AVideo Vulnerable to OS Command Injection via Unsanitized `users_id` and `liveTransmitionHistory_id` in Restreamer Log File Path
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-25T14:28:05.154Z

Reserved: 2026-03-23T15:23:42.217Z

Link: CVE-2026-33648

cve-icon Vulnrichment

Updated: 2026-03-25T14:27:57.080Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-23T19:16:40.907

Modified: 2026-03-25T17:55:16.970

Link: CVE-2026-33648

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:37:16Z

Weaknesses