Ad

CVE-2026-33025

HIGH CVSS 4.0: 8.6 EPSS 0.01%
Updated Mar 24, 2026
PHP
Parameter Value
CVSS 8.6 (HIGH)
Affected Versions before 8.0
Fixed In 8.0
Type CWE-89 (SQL Injection)
Vendor PHP
Public PoC No

AVideo is a video-sharing Platform. Versions prior to 8.0 contain a SQL Injection vulnerability in the getSqlFromPost() method of Object.php. The $_POST['sort'] array keys are used directly as SQL column identifiers inside an ORDER BY clause.

Although real_escape_string() was applied, it only escapes string-context characters (quotes, null bytes) and provides no protection for SQL identifiers — making it entirely ineffective here. This issue has been fixed in version 8.0. To workaround this issue without upgrading, operators can apply a WAF rule to block POST requests where any sort[*] key contains characters outside [A-Za-z0-9_].

Alternatively, restrict access to the queue view (queue.json.php, index.php) to trusted IP ranges only.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
Low
Basic privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
None
No disruption

CVSS Vector v4.0

Weakness Type (CWE)

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Wwbn Avideo-Encoder
cpe:2.3:a:wwbn:avideo-encoder:*:*:*:*:*:*:*:*
8.0