AVideo RCE Chain Gives Attackers Full Server Access Without Auth
Three vulnerabilities in AVideo's CloneSite plugin chain together for unauthenticated remote code execution. CVE-2026-33478 has no patch available as attackers can extract admin credentials and inject OS commands.
A chain of three vulnerabilities in AVideo's CloneSite plugin allows completely unauthenticated attackers to achieve remote code execution on servers running the open-source video platform. The flaws were disclosed this week with no patch currently available.
AVideo (formerly YouPHPTube) is a self-hosted video streaming platform used by organizations wanting YouTube-like functionality without depending on third-party services. The vulnerability chain affects the CloneSite plugin, which enables site replication and backup functionality.
The Attack Chain
CVE-2026-33478 combines three separate weaknesses into a single unauthenticated RCE:
Step 1: Clone Key Disclosure
The clones.json.php endpoint exposes clone secret keys without any authentication. These keys are intended to authorize replication operations between AVideo instances but are accessible to anyone who knows the endpoint exists.
Step 2: Database Dump and Credential Extraction
With a valid clone key, attackers can trigger a full database dump via cloneServer.json.php. The dump contains administrator password hashes stored as MD5, which are trivially crackable with modern hardware or rainbow tables.
MD5 password hashing has been considered cryptographically broken for over a decade. Any credentials stored this way should be assumed compromised once the database is accessible.
Step 3: Command Injection
With admin credentials, attackers exploit an OS command injection in the rsync command construction within cloneClient.json.php. User-controlled input gets passed to system commands without sanitization, enabling arbitrary code execution.
The entire chain requires no authentication at the starting point, and each step enables the next.
Additional Vulnerabilities
The disclosure includes several related CVEs affecting AVideo's CloneSite plugin:
- CVE-2026-33293: Arbitrary file deletion via path traversal in
deleteDumpparameter (CVSS 8.1) - CVE-2026-33292: Authorization bypass allowing streaming of private/paid videos
- CVE-2026-33488: 2FA bypass via cryptographically broken 512-bit RSA key generation
- CVE-2026-33507: CSRF on plugin import enabling unauthenticated RCE via malicious plugin upload
The file deletion bug is particularly dangerous. Attackers with clone credentials can use path traversal (../../) to delete critical files like configuration.php, causing denial of service or enabling further attacks by removing security controls.
No Patch Available
As of publication, no fix has been released. The vulnerabilities were disclosed approximately four days ago. Organizations running AVideo should consider:
- Disable the CloneSite plugin - If site replication isn't actively used, disable the plugin entirely
- Restrict access - Place AVideo behind authentication at the network level
- Monitor for exploitation - Watch for unusual requests to
clones.json.phporcloneServer.json.phpendpoints - Change admin passwords - If the database may have been exposed, rotate credentials immediately
This follows a pattern of web application vulnerabilities we've seen throughout 2026 where multiple flaws chain together for unauthenticated RCE. The Langflow critical vulnerability exploited within 20 hours of disclosure shows how quickly attackers weaponize these chains.
Why This Matters
Self-hosted video platforms often contain sensitive content that organizations chose not to upload to public services for privacy or compliance reasons. A compromised AVideo server could expose internal training videos, confidential presentations, or content meant for paying subscribers.
The CloneSite plugin is designed for backup and migration workflows, so it has extensive access to system resources by design. When that access is exposed without authentication, attackers gain significant leverage.
Organizations running AVideo should audit whether the CloneSite plugin is actually needed and remove it if not. For those requiring the functionality, implementing network-level access controls buys time until a patch arrives.
Related Articles
Oracle Ships Emergency Patch for Critical Identity Manager RCE
CVE-2026-21992 scores CVSS 9.8 and allows unauthenticated remote code execution on Oracle Identity Manager and Web Services Manager. Patch immediately.
Mar 20, 2026Veeam Patches Five Critical RCE Flaws in Backup & Replication
Veeam releases emergency patches for five critical RCE vulnerabilities (CVSS 9.9) affecting Backup & Replication. Domain users can fully compromise backup servers.
Mar 12, 2026CISA Adds n8n RCE Flaw to KEV as 24,700 Instances Sit Exposed
CVE-2025-68613 allows authenticated attackers to execute arbitrary code on n8n workflow servers. CISA gives federal agencies until March 25 to patch.
Mar 12, 2026WeKnora AI Framework Hit with Twin CVSS 9.9 RCE Flaws
Critical command injection and SQL bypass vulnerabilities in Tencent's WeKnora LLM framework allow unauthenticated RCE. Patch to versions 0.2.10 and 0.2.12 now.
Mar 8, 2026