CVE-2026-33293
HIGHAVideo Affected by Arbitrary File Deletion via Path Traversal in CloneSite deleteDump Parameter
Title source: cnaDescription
WWBN AVideo is an open source video platform. Prior to version 26.0, the `deleteDump` parameter in `plugin/CloneSite/cloneServer.json.php` is passed directly to `unlink()` without any path sanitization. An attacker with valid clone credentials can use path traversal sequences (e.g., `../../`) to delete arbitrary files on the server, including critical application files such as `configuration.php`, causing complete denial of service or enabling further attacks by removing security-critical files. Version 26.0 fixes the issue.
References (2)
Core 2
Core References
X_Refsource_Confirm x_refsource_confirm
https://github.com/WWBN/AVideo/security/advisories/GHSA-xmjm-86qv-g226
X_Refsource_Misc x_refsource_misc
https://github.com/WWBN/AVideo/commit/941decd6d19e2e694acb75e86317d10fbb560284
Scores
CVSS v3
8.1
EPSS
0.0006
EPSS Percentile
17.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (3)
wwbn/avideo
< 26.0
wwbn/avideo
0Packagist
WWBN/AVideo
< 26.0
Published
Mar 22, 2026
Tracked Since
Mar 22, 2026