← Retour aux CVEs
CVE-2026-28502
HIGH8.8
Description
WWBN AVideo is an open source video platform. Prior to version 24.0, an authenticated Remote Code Execution (RCE) vulnerability was identified in AVideo related to the plugin upload/import functionality. The issue allowed an authenticated administrator to upload a specially crafted ZIP archive containing executable server-side files. Due to insufficient validation of extracted file contents, the archive was extracted directly into a web-accessible plugin directory, allowing arbitrary PHP code execution. This issue has been patched in version 24.0.
Details CVE
Score CVSS v3.18.8
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie3/6/2026
Derniere modification3/16/2026
Sourcenvd
Observations honeypot0
Produits affectes
wwbn:avideo
Faiblesses (CWE)
CWE-434
References
https://github.com/WWBN/AVideo/commit/b739aeeb9ce34aed9961d2c155d597810f8229db(security-advisories@github.com)
https://github.com/WWBN/AVideo/releases/tag/24.0(security-advisories@github.com)
https://github.com/WWBN/AVideo/security/advisories/GHSA-v8jw-8w5p-23g3(security-advisories@github.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.