Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `objects/pluginRunDatabaseScript.json.php` endpoint accepts a `name` parameter via POST and passes it to `Plugin::getDatabaseFileName()` without any path traversal sanitization. This allows an authenticated admin (or an attacker via CSRF) to traverse outside the plugin directory and execute the contents of any `install/install.sql` file on the filesystem as raw SQL queries against the application database. Commit 81b591c509835505cb9f298aa1162ac64c4152cb contains a patch.
Published: 2026-03-23
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary execution of SQL files via path traversal leading to database compromise
Action: Install patch
AI Analysis

Impact

The vulnerability arises from the pluginRunDatabaseScript.json.php endpoint in AVideo, which accepts a server-side name parameter through a POST request and passes it directly to the Plugin::getDatabaseFileName() function without sanitizing for path traversal characters. This flaw allows an authenticated administrator, or an attacker who can perform a cross‑site request forgery on an authenticated admin session, to specify a filename that points outside the plugin directory. The endpoint then interprets the selected file as a raw SQL script and executes its contents against the application database. An attacker exploiting this flaw could run arbitrary SQL commands, potentially extracting sensitive data, modifying or deleting records, and compromising the integrity and confidentiality of the platform. The impact is therefore a form of remote database code execution rather than arbitrary system code execution.

Affected Systems

The affected product is the open‑source video platform developed by WWBN, known as AVideo. Versions of the software up through 26.0 contain the flaw. Any deployment of AVideo within these version ranges is susceptible if the pluginRunDatabaseScript.json.php endpoint is reachable and an admin or CSRF token can be leveraged.

Risk and Exploitability

The Common Vulnerability Scoring System assigns a 7.2 (High) severity to this flaw, reflecting significant potential damage if exploited. The Exploit Prediction Scoring System reports an exploitation probability of less than 1 %, indicating that while feasible, it is unlikely to be targeted widely at present. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, suggesting no publicly disclosed exploits are known. A likely attack path requires authenticated administrative access or a successful CSRF attack, after which the attacker can supply a malicious pathname to execute arbitrary SQL files located anywhere on the file system. The presence of a patch in the project’s repository mitigates the risk once applied.

Generated by OpenCVE AI on March 25, 2026 at 20:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch referenced by commit 81b591c509835505cb9f298aa1162ac64c4152cb
  • Verify that the latest version of AVideo is deployed and that no older vulnerable files remain on the server
  • Restrict the pluginRunDatabaseScript.json.php endpoint to administrators only and ensure proper CSRF protection is enforced
  • Audit database logs for unexpected SQL execution patterns and monitor for unauthorized admin activity

Generated by OpenCVE AI on March 25, 2026 at 20:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3hwv-x8g3-9qpr AVideo has Path Traversal in pluginRunDatabaseScript.json.php Enables Arbitrary SQL File Execution via Unsanitized Plugin Name
History

Wed, 25 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

Tue, 24 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Wwbn
Wwbn avideo
Vendors & Products Wwbn
Wwbn avideo

Mon, 23 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `objects/pluginRunDatabaseScript.json.php` endpoint accepts a `name` parameter via POST and passes it to `Plugin::getDatabaseFileName()` without any path traversal sanitization. This allows an authenticated admin (or an attacker via CSRF) to traverse outside the plugin directory and execute the contents of any `install/install.sql` file on the filesystem as raw SQL queries against the application database. Commit 81b591c509835505cb9f298aa1162ac64c4152cb contains a patch.
Title AVideo has Path Traversal in pluginRunDatabaseScript.json.php Enables Arbitrary SQL File Execution via Unsanitized Plugin Name
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T16:13:23.412Z

Reserved: 2026-03-23T16:34:59.931Z

Link: CVE-2026-33681

cve-icon Vulnrichment

Updated: 2026-03-24T16:13:14.607Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-23T19:16:41.540

Modified: 2026-03-25T18:03:12.663

Link: CVE-2026-33681

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:37:09Z

Weaknesses