CVE-2026-33502: Unauthenticated SSRF and Command Injection in WWBN AVideo
Vulnerability ID: CVE-2026-33502
CVSS Score: 9.3
Published: 2026-03-20
WWBN AVideo versions up to and including 26.0 suffer from a critical unauthenticated Server-Side Request Forgery (SSRF) and OS Command Injection vulnerability in the Live plugin's test endpoint. This flaw permits remote attackers to probe internal networks, exfiltrate cloud metadata, and execute arbitrary system commands.
TL;DR
An unauthenticated endpoint in AVideo's Live plugin improperly validates user-supplied URLs, enabling Critical SSRF and OS Command Injection (RCE) via a vulnerable wget system call.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-918 (SSRF), CWE-78 (OS Command Injection)
- Attack Vector: Network (Unauthenticated)
- CVSS v3.1 Score: 9.3 (Critical)
- EPSS Score: 0.00045 (15th Percentile)
- Impact: Remote Code Execution, Data Exfiltration
- Exploit Status: Proof of Concept (PoC) Available
- CISA KEV: Not Listed
Affected Systems
- WWBN AVideo <= 26.0
- WWBN AVideo Live Plugin
-
AVideo: <= 26.0 (Fixed in:
26.1)
Code Analysis
Commit: 1e6cf03
Fix unauthenticated SSRF and command injection in Live plugin test.php
Exploit Details
- Technical Blog: Proof of Concept and Technical Analysis of SSRF to RCE vector
Mitigation Strategies
- Upgrade WWBN AVideo to version 26.1 or later.
- Restrict network access to
plugin/Live/test.phpusing web server rules. - Delete the
test.phpfile if testing functionality is not required. - Disable
allow_url_fopenin the PHP configuration (php.ini). - Implement egress firewall filtering to block web server connections to RFC1918 and cloud metadata IP addresses.
Remediation Steps:
- Identify all deployed instances of WWBN AVideo running version 26.0 or earlier.
- Navigate to the application root directory and back up the existing database and configuration files.
- Pull the latest stable release (>= 26.1) from the official WWBN repository.
- Execute the standard AVideo upgrade procedure, ensuring all plugin files are overwritten with the patched versions.
- Verify the remediation by attempting to access
plugin/Live/test.phpwith a benign localhost payload; the request should be blocked or return an error.
References
Read the full report for CVE-2026-33502 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)