Goal Reached Thanks to every supporter โ€” we hit 100%!

Goal: 1000 CNY ยท Raised: 1000 CNY

100.0%

CVE-2026-34374 โ€” AI Deep Analysis Summary

CVSS 9.1 ยท Critical

Q1What is this vulnerability? (Essence + Consequences)

๐Ÿšจ **Essence**: SQL Injection in WWBN AVideo. ๐Ÿ’ฅ **Consequences**: Attackers can manipulate database queries via the `Live_schedule::keyExists` method. This leads to unauthorized data access or system compromise.

Q2Root Cause? (CWE/Flaw)

๐Ÿ›ก๏ธ **Root Cause**: CWE-89 (SQL Injection). ๐Ÿ› **Flaw**: The `Live_schedule::keyExists` method fails to properly parameterize queries. Unsanitized inputs are directly concatenated into SQL statements.

Q3Who is affected? (Versions/Components)

๐Ÿ“ฆ **Affected**: WWBN AVideo. ๐Ÿ“… **Versions**: 26.0 and all previous versions. ๐Ÿข **Vendor**: WWBN Team. ๐ŸŒ **Type**: PHP-based video platform CMS.

Q4What can hackers do? (Privileges/Data)

๐Ÿ‘ฎ **Privileges**: High Risk. ๐Ÿ“Š **Data**: Full Confidentiality (C:H) and Integrity (I:H) impact. โš ๏ธ **Action**: Hackers can read, modify, or delete database contents. No user interaction required.

Q5Is exploitation threshold high? (Auth/Config)

๐Ÿ”“ **Threshold**: LOW. ๐ŸŒ **Access**: Network Accessible (AV:N). ๐Ÿ”‘ **Auth**: None Required (PR:N). ๐Ÿ‘๏ธ **UI**: No User Interaction Needed (UI:N). Easy to exploit remotely.

Q6Is there a public Exp? (PoC/Wild Exploitation)

๐Ÿ“œ **Public Exp?**: No specific PoC code provided in data. ๐Ÿ” **Status**: Advisory published (GHSA-xgv5-66wp-ch88). โš ๏ธ **Risk**: High likelihood of wild exploitation due to low complexity.

Q7How to self-check? (Features/Scanning)

๐Ÿ” **Check**: Scan for WWBN AVideo instances. ๐Ÿ“ก **Feature**: Look for `Live_schedule::keyExists` endpoints. ๐Ÿงช **Test**: Use SQL injection payloads on schedule-related parameters. ๐Ÿ› ๏ธ **Tool**: Standard SQLi scanners.

Q8Is it fixed officially? (Patch/Mitigation)

๐Ÿฉน **Fix**: Official advisory exists on GitHub. ๐Ÿ“ฅ **Action**: Update to the patched version immediately. ๐Ÿ”— **Ref**: https://github.com/WWBN/AVideo/security/advisories/GHSA-xgv5-66wp-ch88

Q9What if no patch? (Workaround)

๐Ÿšง **Workaround**: If unpatched, restrict network access to AVideo. ๐Ÿ›‘ **Mitigation**: Implement WAF rules to block SQLi patterns in schedule parameters.โ€ฆ

Q10Is it urgent? (Priority Suggestion)

๐Ÿ”ฅ **Urgency**: CRITICAL. ๐Ÿ“‰ **CVSS**: High (H/H/N). โฑ๏ธ **Priority**: Patch ASAP. ๐Ÿšจ **Reason**: Remote, unauthenticated, high impact. Immediate action required to prevent data breach.