← Zuruck zu CVEs
CVE-2026-28502
HIGH8.8
Beschreibung
WWBN AVideo is an open source video platform. Prior to version 24.0, an authenticated Remote Code Execution (RCE) vulnerability was identified in AVideo related to the plugin upload/import functionality. The issue allowed an authenticated administrator to upload a specially crafted ZIP archive containing executable server-side files. Due to insufficient validation of extracted file contents, the archive was extracted directly into a web-accessible plugin directory, allowing arbitrary PHP code execution. This issue has been patched in version 24.0.
CVE Details
CVSS v3.1 Bewertung8.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht3/6/2026
Zuletzt geandert3/16/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
wwbn:avideo
Schwachen (CWE)
CWE-434
Referenzen
https://github.com/WWBN/AVideo/commit/b739aeeb9ce34aed9961d2c155d597810f8229db(security-advisories@github.com)
https://github.com/WWBN/AVideo/releases/tag/24.0(security-advisories@github.com)
https://github.com/WWBN/AVideo/security/advisories/GHSA-v8jw-8w5p-23g3(security-advisories@github.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.