Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-584p-rpvq-35vf | AVideo has SQL Injection in category.php fixCleanTitle() via Unparameterized clean_title and id Variables |
Tue, 31 Mar 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 31 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wwbn
Wwbn avideo |
|
| Vendors & Products |
Wwbn
Wwbn avideo |
Fri, 27 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `fixCleanTitle()` static method in `objects/category.php` constructs a SQL SELECT query by directly interpolating both `$clean_title` and `$id` into the query string without using prepared statements or parameterized queries. An attacker who can trigger category creation or renaming with a crafted title value can inject arbitrary SQL. Commit 994cc2b3d802b819e07e6088338e8bf4e484aae4 contains a patch. | |
| Title | AVideo has SQL Injection in category.php fixCleanTitle() via Unparameterized clean_title and id Variables | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-31T13:29:27.273Z
Reserved: 2026-03-23T18:30:14.128Z
Link: CVE-2026-33770
Updated: 2026-03-31T13:29:23.141Z
Status : Analyzed
Published: 2026-03-27T17:16:29.747
Modified: 2026-03-31T16:46:25.347
Link: CVE-2026-33770
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:01:04Z
Github GHSA