Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `Live_schedule::keyExists()` method constructs a SQL query by interpolating a stream key directly into the query string without parameterization. This method is called as a fallback from `LiveTransmition::keyExists()` when the initial parameterized lookup returns no results. Although the calling function correctly uses parameterized queries for its own lookup, the fallback path to `Live_schedule::keyExists()` undoes this protection entirely. This vulnerability is distinct from GHSA-pvw4-p2jm-chjm, which covers SQL injection via the `live_schedule_id` parameter in the reminder function. This finding targets the stream key lookup path used during RTMP publish authentication. As of time of publication, no patched versions are available.
Published: 2026-03-27
Score: 9.1 Critical
EPSS: n/a
KEV: No
Impact: Database Compromise via Remote SQL Injection
Action: Patch Now
AI Analysis

Impact

The flaw resides in the Live_schedule::keyExists() function, which concatenates a stream key directly into an SQL query without using parameterized statements. This bypass occurs during RTMP publish authentication, allowing an attacker to supply a specially crafted stream key that injects arbitrary SQL. Successful exploitation could give the attacker read and write access to the database, permitting data exfiltration, tampering with user accounts, or altering system configuration. The vulnerability is classified as CWE-89, indicating a classic SQL injection weakness.

Affected Systems

The affected product is WWBN AVideo, an open source video platform. All releases up to and including version 26.0 are vulnerable. No patched version is currently available; vendors have not released an update at the time of this advisory.

Risk and Exploitability

The CVSS score is 9.1, representing high severity. EPSS data is unavailable and the issue is not listed in CISA’s Known Exploited Vulnerabilities catalog. It is inferred that the attack vector involves an RTMP publisher sending a malicious stream key during authentication. Because the injection opportunity exists on a public-facing broadcast endpoint, attackers with any RTMP client capability could potentially exploit the flaw, provided they know a valid broadcast URL.

Generated by OpenCVE AI on March 27, 2026 at 19:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade AVideo to a version beyond 26.0 when it becomes available
  • Restrict RTMP publishing to trusted IP addresses or networks
  • Implement firewall rules to block unsolicited RTMP connections
  • Enable logging for failed login attempts and monitor for anomalous SQL injection patterns
  • Apply general web application security best practices, such as sanitizing all user inputs and using parameterized queries in all database interactions

Generated by OpenCVE AI on March 27, 2026 at 19:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Description WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `Live_schedule::keyExists()` method constructs a SQL query by interpolating a stream key directly into the query string without parameterization. This method is called as a fallback from `LiveTransmition::keyExists()` when the initial parameterized lookup returns no results. Although the calling function correctly uses parameterized queries for its own lookup, the fallback path to `Live_schedule::keyExists()` undoes this protection entirely. This vulnerability is distinct from GHSA-pvw4-p2jm-chjm, which covers SQL injection via the `live_schedule_id` parameter in the reminder function. This finding targets the stream key lookup path used during RTMP publish authentication. As of time of publication, no patched versions are available.
Title AVideo has SQL Injection in Live_schedule::keyExists() via Unparameterized Stream Key
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T19:33:12.013Z

Reserved: 2026-03-27T13:43:14.369Z

Link: CVE-2026-34374

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T19:16:42.930

Modified: 2026-03-27T19:16:42.930

Link: CVE-2026-34374

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T20:27:48Z

Weaknesses