WWBN AVideo is an open source video platform. Prior to version 24.0, an authenticated Remote Code Execution (RCE) vulnerability was identified in AVideo related to the plugin upload/import functionality. The issue allowed an authenticated administrator to upload a specially crafted ZIP archive containing executable server-side files. Due to insufficient validation of extracted file contents, the archive was extracted directly into a web-accessible plugin directory, allowing arbitrary PHP code execution. This issue has been patched in version 24.0.
References
| Link | Resource |
|---|---|
| https://github.com/WWBN/AVideo/commit/b739aeeb9ce34aed9961d2c155d597810f8229db | Patch |
| https://github.com/WWBN/AVideo/releases/tag/24.0 | Product Release Notes |
| https://github.com/WWBN/AVideo/security/advisories/GHSA-v8jw-8w5p-23g3 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-06 04:16
Updated : 2026-03-16 15:03
NVD link : CVE-2026-28502
Mitre link : CVE-2026-28502
CVE.ORG link : CVE-2026-28502
JSON object : View
Products Affected
wwbn
- avideo
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
