CVE-2026-28501
CRITICALCVSS v3
9.8
CRITICAL
EPSS Score
25.7%
exploit probability
CISA KEV
No
known exploited
Exploitation
—
SSVC status
Description
WWBN AVideo is an open source video platform. Prior to version 24.0, an unauthenticated SQL Injection vulnerability exists in AVideo within the objects/videos.json.php and objects/video.php components. The application fails to properly sanitize the catName parameter when it is supplied via a JSON-formatted POST request body. Because JSON input is parsed and merged into $_REQUEST after global security checks are executed, the payload bypasses the existing sanitization mechanisms. This issue has b
Technical Details
- CVSS v3 Vector
- 3.1
- Published
- 3/6/2026
- Last Modified
- 3/16/2026
Frequently Asked Questions
What is CVE-2026-28501?
WWBN AVideo is an open source video platform. Prior to version 24.0, an unauthenticated SQL Injection vulnerability exists in AVideo within the objects/videos.json.php and objects/video.php components. The application fails to properly sanitize the catName parameter when it is supplied via a JSON-formatted POST request body. Because JSON input is parsed and merged into $_REQUEST after global security checks are executed, the payload bypasses the existing sanitization mechanisms. This issue has b
Is CVE-2026-28501 actively exploited?
Active exploitation of CVE-2026-28501 has not been confirmed. The EPSS score is 25.7%, indicating the estimated probability of exploitation in the next 30 days.
What is the CVSS score for CVE-2026-28501?
CVE-2026-28501 has a CVSS v3 base score of 9.8 (CRITICAL severity), with vector string 3.1.
Is CVE-2026-28501 affecting your environment?
Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.