CVE-2026-33767

HIGH

AVideo has SQL Injection via Partial Prepared Statement — videos_id Concatenated Directly into Query

Title source: cna
STIX 2.1

Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, in `objects/like.php`, the `getLike()` method constructs a SQL query using a prepared statement placeholder (`?`) for `users_id` but directly concatenates `$this->videos_id` into the query string without parameterization. An attacker who can control the `videos_id` value (via a crafted request) can inject arbitrary SQL, bypassing the partial prepared-statement protection. Commit 0215d3c4f1ee748b8880254967b51784b8ac4080 contains a patch.

Scores

CVSS v3 8.8
EPSS 0.0002
EPSS Percentile 6.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-89
Status published
Products (3)
wwbn/avideo < 26.0
wwbn/avideo 0 - 26.0Packagist
WWBN/AVideo <= 26.0
Published Mar 27, 2026
Tracked Since Mar 29, 2026