← Back to CVEs
CVE-2026-28502
HIGH8.8
Description
WWBN AVideo is an open source video platform. Prior to version 24.0, an authenticated Remote Code Execution (RCE) vulnerability was identified in AVideo related to the plugin upload/import functionality. The issue allowed an authenticated administrator to upload a specially crafted ZIP archive containing executable server-side files. Due to insufficient validation of extracted file contents, the archive was extracted directly into a web-accessible plugin directory, allowing arbitrary PHP code execution. This issue has been patched in version 24.0.
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published3/6/2026
Last Modified3/16/2026
Sourcenvd
Honeypot Sightings0
Affected Products
wwbn:avideo
Weaknesses (CWE)
CWE-434
References
https://github.com/WWBN/AVideo/commit/b739aeeb9ce34aed9961d2c155d597810f8229db(security-advisories@github.com)
https://github.com/WWBN/AVideo/releases/tag/24.0(security-advisories@github.com)
https://github.com/WWBN/AVideo/security/advisories/GHSA-v8jw-8w5p-23g3(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.