Ad

CVE-2026-33024

CRITICAL CVSS 4.0: 9.3 EPSS 0.03%
Updated Mar 24, 2026
Meta
Parameter Value
CVSS 9.3 (CRITICAL)
Affected Versions before 8.0
Fixed In 8.0
Type CWE-918 (Server-Side Request Forgery (SSRF))
Vendor Meta
Public PoC No

AVideo is a video-sharing Platform. Versions prior to 8.0 contain a Server-Side Request Forgery vulnerability (CWE-918) in the public thumbnail endpoints getImage.php and getImageMP4.php. Both endpoints accept a base64Url GET parameter, base64-decode it, and pass the resulting URL to ffmpeg as an input source without any authentication requirement.

The prior validation only checked that the URL was syntactically valid (FILTER_VALIDATE_URL) and started with http(s)://. This is insufficient: an attacker can supply URLs such as http://169.254.169.254/latest/meta-data/ (AWS/cloud instance metadata), http://192.168.x.x/, or http://127.0.0.1/ to make the server reach internal network resources. The response is not directly returned (blind), but timing differences and error logs can be used to infer results.

The issue has been fixed in version 8.0.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
None
No disruption

CVSS Vector v4.0

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Wwbn Avideo-Encoder
cpe:2.3:a:wwbn:avideo-encoder:*:*:*:*:*:*:*:*
8.0