Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-33478: AVideo CloneSite Plugin Unauthenticated RCE (CVSS 10.0)
CVE-2026-33478: AVideo CloneSite Plugin Unauthenticated RCE (CVSS 10.0)

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-33478

CVE-2026-33478: AVideo CloneSite Plugin Unauthenticated RCE (CVSS 10.0)

A critical chain of vulnerabilities in WWBN AVideo's CloneSite plugin allows fully unauthenticated attackers to achieve remote code execution via key...

Dylan H.

Security Team

March 24, 2026
4 min read

Affected Products

  • WWBN AVideo <= 26.0
  • AVideo CloneSite Plugin
  • AVideo Live Plugin
  • AVideo Gallery Plugin

Overview

CVE-2026-33478 is a maximum-severity (CVSS 10.0) remote code execution vulnerability in WWBN AVideo, an open-source video platform. Published on March 23, 2026, the flaw resides in AVideo's CloneSite plugin and affects all versions up to and including 26.0. An entirely unauthenticated attacker can chain three weaknesses together to execute arbitrary OS commands on the server — no credentials, no prior access, and no user interaction required.

Two additional AVideo CVEs were disclosed the same day: CVE-2026-33351 (CVSS 9.1, SSRF in the Live plugin) and CVE-2026-33479 (CVSS 8.8, CSRF plus arbitrary PHP execution in the Gallery plugin). All three require AVideo 26.0 or earlier.


Technical Details

The exploit is a three-stage attack chain:

Stage 1 — Clone Secret Key Disclosure (Unauthenticated)

The clones.json.php endpoint exposes sensitive clone secret keys to any unauthenticated HTTP request. No authentication check exists on this endpoint, providing the attacker with the credential material needed for the next stage.

Stage 2 — Full Database Dump via cloneServer.json.php

Using the stolen clone keys, the attacker triggers a full database export through the cloneServer.json.php endpoint. The dumped database contains admin password hashes stored as MD5 — a cryptographically broken algorithm. These hashes are trivially crackable with modern GPU-accelerated tools or rainbow tables, yielding plaintext admin credentials.

Stage 3 — OS Command Injection via cloneClient.json.php

With admin access established, the attacker reaches an OS command injection vulnerability in the rsync command construction within cloneClient.json.php. Unsanitized user-controlled input is passed directly into a shell command, classified as CWE-78 (OS Command Injection). This grants full arbitrary command execution as the web server process.

Bonus: Authenticated Arbitrary PHP Execution

Once admin credentials are obtained, AVideo also exposes an authenticated endpoint that passes user-supplied PHP code to a dynamic code execution function — providing a second, persistent path to full server compromise.


Affected Versions

SoftwareAffected Versions
WWBN AVideoAll versions up to and including 26.0
AVideo CloneSite PluginBundled with AVideo <= 26.0
AVideo Live PluginAffected by related CVE-2026-33351
AVideo Gallery PluginAffected by related CVE-2026-33479

CVSS Score Breakdown

MetricValue
Base Score10.0 (Critical)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeChanged
CWECWE-78 (OS Command Injection)

Patch & Mitigation

Patch: Commit c85d076375fab095a14170df7ddb27058134d38c in the AVideo repository contains the fix.

Immediate mitigations for unpatched instances:

  1. Restrict access to CloneSite, Live, and Gallery plugin endpoints at the web server or firewall level.
  2. Block unauthenticated access to clones.json.php, cloneServer.json.php, and cloneClient.json.php.
  3. Rotate all admin passwords and regenerate clone secret keys.
  4. Upgrade to a patched release as soon as one is available.
  5. Consider placing AVideo behind an authentication proxy if internet-facing deployment cannot be avoided.

Related CVEs

CVECVSSDescription
CVE-2026-3347810.0Unauthenticated RCE via CloneSite key disclosure + DB dump + OS command injection
CVE-2026-333519.1SSRF in AVideo Live plugin standalone configuration
CVE-2026-334798.8CSRF plus arbitrary PHP code execution in AVideo Gallery plugin
CVE-2026-33293—Arbitrary file deletion via path traversal in CloneSite deleteDump parameter

Recommendations

All AVideo administrators running version 26.0 or earlier should treat this as an emergency. The vulnerability requires zero authentication and has a fully public attack chain. Apply the patch immediately. If patching is not immediately possible, restrict network access to the affected plugin endpoints and consider taking the AVideo instance offline until remediation is complete.

Monitor server logs for unusual access to clones.json.php, cloneServer.json.php, or cloneClient.json.php — any access to these paths from external IPs should be treated as a potential active exploit.

#CVE#RCE#AVideo#OS Command Injection#CWE-78#Open Source#NVD

Related Articles

CVE-2026-32298: Angeet ES3 KVM OS Command Injection via cfg.lua Script

A high-severity OS command injection vulnerability (CVSS 9.1) in the Angeet ES3 KVM switch allows authenticated attackers to execute arbitrary OS-level...

5 min read

CVE-2026-21994: Critical Unauthenticated RCE in Oracle Edge Cloud Infrastructure Designer v0.3.0

A critical unauthenticated remote code execution vulnerability (CVSS 9.8) in Oracle's Edge Cloud Infrastructure Designer and Visualisation Toolkit allows...

6 min read

CVE-2026-28775: Unauthenticated Root RCE in IDC SFX

A critical unauthenticated RCE vulnerability in International Datacasting Corporation's SFX Series satellite receivers allows attackers to execute...

5 min read
Back to all Security Alerts