CVE-2026-33485
AVideo has an Unauthenticated Blind SQL Injection in RTMP on_publish Callback via Stream Name Parameter
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the RTMP `on_publish` callback at `plugin/Live/on_publish.php` is accessible without authentication. The `$_POST['name']` parameter (stream key) is interpolated directly into SQL queries in two locations โ `LiveTransmitionHistory::getLatest()` and `LiveTransmition::keyExists()` โ without parameterized binding or escaping. An unauthenticated attacker can exploit time-based blind SQL injection to extract all database contents including user password hashes, email addresses, and other sensitive data. Commit af59eade82de645b20183cc3d74467a7eac76549 contains a patch.
| CWE | CWE-89 |
| Vendor | wwbn |
| Product | avideo |
| Published | Mar 23, 2026 |
| Last Updated | Mar 25, 2026 |
Get instant alerts for wwbn avideo
Be the first to know when new high vulnerabilities affecting wwbn avideo are published โ delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N