๐Ÿ” CVE Alert

CVE-2026-33767

UNKNOWN 0.0

AVideo has SQL Injection via Partial Prepared Statement โ€” videos_id Concatenated Directly into Query

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

WWBN AVideo is an open source video platform. In versions up to and including 26.0, in `objects/like.php`, the `getLike()` method constructs a SQL query using a prepared statement placeholder (`?`) for `users_id` but directly concatenates `$this->videos_id` into the query string without parameterization. An attacker who can control the `videos_id` value (via a crafted request) can inject arbitrary SQL, bypassing the partial prepared-statement protection. Commit 0215d3c4f1ee748b8880254967b51784b8ac4080 contains a patch.

CWE CWE-89
Vendor wwbn
Product avideo
Published Mar 27, 2026
Last Updated Mar 27, 2026
Stay Ahead of the Next One

Get instant alerts for wwbn avideo

Be the first to know when new unknown vulnerabilities affecting wwbn avideo are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

WWBN / AVideo
<= 26.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/WWBN/AVideo/security/advisories/GHSA-fj74-qxj7-r3vc github.com: https://github.com/WWBN/AVideo/commit/0215d3c4f1ee748b8880254967b51784b8ac4080