Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
9.8
AVideo: Unauthenticated SQL Injection Allows Data Theft
CVE-2026-28501
GHSA-pv87-r9qf-x56p
GHSA-pv87-r9qf-x56p
Summary
An attacker can steal sensitive data, including passwords and user records, by sending a special kind of request to AVideo's video management system. To fix this, update to version 23 or later. There is no temporary fix, so updating as soon as possible is recommended.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| wwbn | avideo | <= 21.0.0 | – |
| wwbn | wwbn/avideo | <= 21.0.0 | – |
Original title
AVideo has Unauthenticated SQL Injection via JSON Request Bypass in objects/videos.json.php
Original description
## Impact
An unauthenticated SQL Injection vulnerability exists in AVideo within the objects/videos.json.php and objects/video.php components.
The application fails to properly sanitize the catName parameter when it is supplied via a JSON-formatted POST request body. Because JSON input is parsed and merged into $_REQUEST after global security checks are executed, the payload bypasses the existing sanitization mechanisms.
This allows an unauthenticated attacker to:
- Execute arbitrary SQL queries
- Perform full database exfiltration
- Extract sensitive data including administrator usernames, password hashes, session identifiers and user records
- Potentially escalate privileges by cracking password hashes offline
- Chain with authenticated vulnerabilities to achieve full system compromise
This vulnerability is classified as:
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)
## Patches
This vulnerability has been fixed in version 23.
Users must upgrade to version 23 or later.
## Workarounds
There is no reliable workaround.
The only recommended mitigation is to upgrade immediately to version 23 upon its release.
## References
Internal security report.
An unauthenticated SQL Injection vulnerability exists in AVideo within the objects/videos.json.php and objects/video.php components.
The application fails to properly sanitize the catName parameter when it is supplied via a JSON-formatted POST request body. Because JSON input is parsed and merged into $_REQUEST after global security checks are executed, the payload bypasses the existing sanitization mechanisms.
This allows an unauthenticated attacker to:
- Execute arbitrary SQL queries
- Perform full database exfiltration
- Extract sensitive data including administrator usernames, password hashes, session identifiers and user records
- Potentially escalate privileges by cracking password hashes offline
- Chain with authenticated vulnerabilities to achieve full system compromise
This vulnerability is classified as:
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)
## Patches
This vulnerability has been fixed in version 23.
Users must upgrade to version 23 or later.
## Workarounds
There is no reliable workaround.
The only recommended mitigation is to upgrade immediately to version 23 upon its release.
## References
Internal security report.
nvd CVSS3.1
9.8
Vulnerability type
CWE-89
SQL Injection
- https://github.com/WWBN/AVideo/commit/0c10be681c64044618ab94473251bd7c9b114fa1
- https://github.com/WWBN/AVideo/releases/tag/24.0
- https://github.com/WWBN/AVideo/security/advisories/GHSA-pv87-r9qf-x56p
- https://nvd.nist.gov/vuln/detail/CVE-2026-28501
- https://github.com/advisories/GHSA-pv87-r9qf-x56p
- https://github.com/WWBN/AVideo Product
Published: 2 Mar 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026