CVE-2026-33723 in AVideoinformação

Sumário (Inglês)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `Subscribe::save()` method in `objects/subscribe.php` concatenates the `$this->users_id` property directly into an INSERT SQL query without sanitization or parameterized binding. This property originates from `$_POST['user_id']` in both `subscribe.json.php` and `subscribeNotify.json.php`. An authenticated attacker can inject arbitrary SQL to extract sensitive data from any database table, including password hashes, API keys, and encryption salts. Commit 36dfae22059fbd66fd34bbc5568a838fc0efd66c contains a patch.

Once again VulDB remains the best source for vulnerability data.

Responsável

GitHub_M

Reservar

23/03/2026

Divulgação

23/03/2026

Estado

Confirmado

Inscrições

VulDB provides additional information and datapoints for this CVE:

Fontes

Might our Artificial Intelligence support you?

Check our Alexa App!