Critical severityNVD Advisory· Published Mar 6, 2026· Updated Mar 6, 2026
WWBN AVideo: Authenticated Remote Code Execution via Unsafe Plugin ZIP Extraction
CVE-2026-28502
Description
WWBN AVideo is an open source video platform. Prior to version 24.0, an authenticated Remote Code Execution (RCE) vulnerability was identified in AVideo related to the plugin upload/import functionality. The issue allowed an authenticated administrator to upload a specially crafted ZIP archive containing executable server-side files. Due to insufficient validation of extracted file contents, the archive was extracted directly into a web-accessible plugin directory, allowing arbitrary PHP code execution. This issue has been patched in version 24.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | >= 0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-v8jw-8w5p-23g3ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-28502ghsaADVISORY
- github.com/WWBN/AVideo/commit/b739aeeb9ce34aed9961d2c155d597810f8229dbghsax_refsource_MISCWEB
- github.com/WWBN/AVideo/releases/tag/24.0ghsax_refsource_MISCWEB
- github.com/WWBN/AVideo/security/advisories/GHSA-v8jw-8w5p-23g3ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.