AVideo has PHP Code Injection via eval() in Gallery saveSort.json.php Exploitable Through CSRF Against Admin
Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the Gallery plugin's saveSort.json.php endpoint passes unsanitized user input from $_REQUEST['sections'] array values directly into PHP's eval() function. While the endpoint is gated behind User::isAdmin(), it has no CSRF token validation. Combined with AVideo's explicit SameSite=None session cookie configuration, an attacker can exploit this via cross-site request forgery to achieve unauthenticated remote code execution — requiring only that an admin visits an attacker-controlled page. Commit 087dab8841f8bdb54be184105ef19b47c5698fcb contains a patch.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | <= 26.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-xggw-g9pm-9qhhghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33479ghsaADVISORY
- github.com/WWBN/AVideo/commit/087dab8841f8bdb54be184105ef19b47c5698fcbghsax_refsource_MISCWEB
- github.com/WWBN/AVideo/security/advisories/GHSA-xggw-g9pm-9qhhghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.