CVE-2026-28501

CRITICAL

CVSS v3

9.8

CRITICAL

EPSS Score

25.7%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

WWBN AVideo is an open source video platform. Prior to version 24.0, an unauthenticated SQL Injection vulnerability exists in AVideo within the objects/videos.json.php and objects/video.php components. The application fails to properly sanitize the catName parameter when it is supplied via a JSON-formatted POST request body. Because JSON input is parsed and merged into $_REQUEST after global security checks are executed, the payload bypasses the existing sanitization mechanisms. This issue has b

Technical Details

CVSS v3 Vector
3.1
Published
3/6/2026
Last Modified
3/16/2026

Frequently Asked Questions

What is CVE-2026-28501?

WWBN AVideo is an open source video platform. Prior to version 24.0, an unauthenticated SQL Injection vulnerability exists in AVideo within the objects/videos.json.php and objects/video.php components. The application fails to properly sanitize the catName parameter when it is supplied via a JSON-formatted POST request body. Because JSON input is parsed and merged into $_REQUEST after global security checks are executed, the payload bypasses the existing sanitization mechanisms. This issue has b

Is CVE-2026-28501 actively exploited?

Active exploitation of CVE-2026-28501 has not been confirmed. The EPSS score is 25.7%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2026-28501?

CVE-2026-28501 has a CVSS v3 base score of 9.8 (CRITICAL severity), with vector string 3.1.

Is CVE-2026-28501 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.