High severityNVD Advisory· Published Mar 23, 2026· Updated Mar 24, 2026
AVideo has Path Traversal in pluginRunDatabaseScript.json.php Enables Arbitrary SQL File Execution via Unsanitized Plugin Name
CVE-2026-33681
Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the objects/pluginRunDatabaseScript.json.php endpoint accepts a name parameter via POST and passes it to Plugin::getDatabaseFileName() without any path traversal sanitization. This allows an authenticated admin (or an attacker via CSRF) to traverse outside the plugin directory and execute the contents of any install/install.sql file on the filesystem as raw SQL queries against the application database. Commit 81b591c509835505cb9f298aa1162ac64c4152cb contains a patch.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | <= 26.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-3hwv-x8g3-9qprghsaADVISORY
- github.com/advisories/GHSA-v8jw-8w5p-23g3ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33681ghsaADVISORY
- github.com/WWBN/AVideo/commit/81b591c509835505cb9f298aa1162ac64c4152cbghsax_refsource_MISCWEB
- github.com/WWBN/AVideo/security/advisories/GHSA-3hwv-x8g3-9qprghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.