CVE-2026-33293: Php RCE — Patch Guide
CVE-2026-33293
Attackers with clone-site credentials can delete arbitrary files on WWBN AVideo servers via CVE-2026-33293, enabling full DoS. Upgrade to version 26.0 now.
Vendor-confirmed - CVE-2026-33293 is a high arbitrary file-deletion vulnerability in WWBN AVideo prior to 26.0 that lets authenticated attackers delete critical server files, causing complete denial of service. Upgrade to version 26.0 to remediate.
Overview
A significant security vulnerability, tracked as CVE-2026-33293, has been discovered in the WWBN AVideo open-source video platform. This flaw allows an attacker with valid clone-site credentials to delete arbitrary files on the server, potentially crippling the entire application.
Vulnerability Details
In versions of WWBN AVideo prior to 26.0, a specific function within the clone-site feature is improperly secured. The deleteDump parameter in the file plugin/CloneSite/cloneServer.json.php is not validated or sanitized before being used. This parameter is passed directly to the unlink() PHP function, which is responsible for deleting files.
An attacker can exploit this by submitting path traversal sequences (like ../../) in the parameter. This tricks the system into escaping the intended directory and navigating to other locations on the server’s file system.
Impact and Risks
The impact of this vulnerability is severe (CVSS score 8.1, HIGH). A successful attack can lead to:
- Complete Denial of Service: An attacker can delete critical application files, such as
configuration.php. Without this file, the AVideo platform will fail to operate, causing a total service outage. - Further System Compromise: By deleting security-critical files, an attacker could weaken the system’s defenses, potentially enabling additional attacks or making it easier to gain further unauthorized access.
- Data Loss: While the primary function is deletion, the destruction of configuration or log files can hinder recovery efforts and forensic analysis.
This type of vulnerability is a common vector in major security incidents, underscoring the importance of prompt patching. For context on how such flaws contribute to larger breaches, you can review historical incidents in our breach reports.
Remediation and Mitigation
The vendor has released a fix in WWBN AVideo version 26.0. This is the only complete solution.
Action Required:
- Immediate Upgrade: All administrators must upgrade their installations to version 26.0 or later without delay.
- Inventory and Credential Review: Review and audit accounts with “clone” privileges. Ensure the principle of least privilege is followed and that credentials are secure.
- Post-Upgrade Verification: After upgrading, verify the integrity of critical application files, especially
configuration.php, to ensure they were not tampered with before the patch was applied.
There is no effective workaround for this vulnerability without applying the official patch. Relying on network security controls alone is insufficient, as the attack originates from an authenticated user within the application itself.
Staying informed about such vulnerabilities is crucial for maintaining a strong security posture. For the latest updates on threats and patches, follow our security news.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-33293?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
WWBN AVideo is an open source video platform. Prior to version 26.0, the HLS streaming endpoint (`view/hls.php`) is vulnerable to a path traversal attack that allows an unauthenticated attacker to str...
WWBN AVideo is an open source video platform. Prior to version 26.0, the `setPassword.json.php` endpoint in the CustomizeUser plugin allows administrators to set a channel password for any user. Due t...
WWBN AVideo is an open source video platform. Prior to version 26.0, a Server-Side Request Forgery (SSRF) vulnerability exists in `plugin/Live/standAloneFiles/saveDVR.json.php`. When the AVideo Live p...
WWBN AVideo is an open source video platform. Prior to version 26.0, an unauthenticated SQL injection vulnerability exists in `objects/category.php` in the `getAllCategories()` method. The `doNotShowC...
Other Wwbn Avideo Vulnerabilities
WWBN AVideo is an open source video platform. In versions up to and including 29.0, an incomplete fix for AVideo's `test.php` adds `escapeshellarg` for wget but leaves the `file_get_contents` and `cur...
WWBN AVideo is an open source video platform. In versions 29.0 and prior, the YPTSocket plugin's WebSocket server relays attacker-supplied JSON message bodies to every connected client without sanitiz...
WWBN AVideo is an open source video platform. Prior to version 26.0, the `setPassword.json.php` endpoint in the CustomizeUser plugin allows administrators to set a channel password for any user. Due t...
WWBN AVideo is an open source video platform. Prior to version 26.0, a Server-Side Request Forgery (SSRF) vulnerability exists in `plugin/Live/standAloneFiles/saveDVR.json.php`. When the AVideo Live p...