Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-pq8p-wc4f-vg7j | WWBN AVideo has an incomplete fix for CVE-2026-33502: Command Injection |
Fri, 24 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:* |
Wed, 22 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wwbn
Wwbn avideo |
|
| Vendors & Products |
Wwbn
Wwbn avideo |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WWBN AVideo is an open source video platform. In versions up to and including 29.0, an incomplete fix for AVideo's `test.php` adds `escapeshellarg` for wget but leaves the `file_get_contents` and `curl` code paths unsanitized, and the URL validation regex `/^http/` accepts strings like `httpevil[.]com`. Commit 78bccae74634ead68aa6528d631c9ec4fd7aa536 contains an updated fix. | |
| Title | AVideo has an incomplete fix for CVE-2026-33502 (Command Injection) | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-22T18:09:42.398Z
Reserved: 2026-04-16T16:43:03.173Z
Link: CVE-2026-41064
Updated: 2026-04-22T18:09:36.932Z
Status : Analyzed
Published: 2026-04-22T00:16:28.187
Modified: 2026-04-24T15:10:50.640
Link: CVE-2026-41064
No data.
OpenCVE Enrichment
Updated: 2026-04-22T06:15:10Z
Github GHSA