AVideo RCE Chain Gives Attackers Full Server Access Without Auth
Three vulnerabilities in AVideo's CloneSite plugin chain together for unauthenticated remote code execution. CVE-2026-33478 has no patch available as attackers can extract admin credentials and inject OS commands.
A chain of three vulnerabilities in AVideo's CloneSite plugin allows completely unauthenticated attackers to achieve remote code execution on servers running the open-source video platform. The flaws were disclosed this week with no patch currently available.
AVideo (formerly YouPHPTube) is a self-hosted video streaming platform used by organizations wanting YouTube-like functionality without depending on third-party services. The vulnerability chain affects the CloneSite plugin, which enables site replication and backup functionality.
The Attack Chain
CVE-2026-33478 combines three separate weaknesses into a single unauthenticated RCE:
Step 1: Clone Key Disclosure
The clones.json.php endpoint exposes clone secret keys without any authentication. These keys are intended to authorize replication operations between AVideo instances but are accessible to anyone who knows the endpoint exists.
Step 2: Database Dump and Credential Extraction
With a valid clone key, attackers can trigger a full database dump via cloneServer.json.php. The dump contains administrator password hashes stored as MD5, which are trivially crackable with modern hardware or rainbow tables.
MD5 password hashing has been considered cryptographically broken for over a decade. Any credentials stored this way should be assumed compromised once the database is accessible.
Step 3: Command Injection
With admin credentials, attackers exploit an OS command injection in the rsync command construction within cloneClient.json.php. User-controlled input gets passed to system commands without sanitization, enabling arbitrary code execution.
The entire chain requires no authentication at the starting point, and each step enables the next.
Additional Vulnerabilities
The disclosure includes several related CVEs affecting AVideo's CloneSite plugin:
- CVE-2026-33293: Arbitrary file deletion via path traversal in
deleteDumpparameter (CVSS 8.1) - CVE-2026-33292: Authorization bypass allowing streaming of private/paid videos
- CVE-2026-33488: 2FA bypass via cryptographically broken 512-bit RSA key generation
- CVE-2026-33507: CSRF on plugin import enabling unauthenticated RCE via malicious plugin upload
The file deletion bug is particularly dangerous. Attackers with clone credentials can use path traversal (../../) to delete critical files like configuration.php, causing denial of service or enabling further attacks by removing security controls.
No Patch Available
As of publication, no fix has been released. The vulnerabilities were disclosed approximately four days ago. Organizations running AVideo should consider:
- Disable the CloneSite plugin - If site replication isn't actively used, disable the plugin entirely
- Restrict access - Place AVideo behind authentication at the network level
- Monitor for exploitation - Watch for unusual requests to
clones.json.phporcloneServer.json.phpendpoints - Change admin passwords - If the database may have been exposed, rotate credentials immediately
This follows a pattern of web application vulnerabilities we've seen throughout 2026 where multiple flaws chain together for unauthenticated RCE. The Langflow critical vulnerability exploited within 20 hours of disclosure shows how quickly attackers weaponize these chains.
Why This Matters
Self-hosted video platforms often contain sensitive content that organizations chose not to upload to public services for privacy or compliance reasons. A compromised AVideo server could expose internal training videos, confidential presentations, or content meant for paying subscribers.
The CloneSite plugin is designed for backup and migration workflows, so it has extensive access to system resources by design. When that access is exposed without authentication, attackers gain significant leverage.
Organizations running AVideo should audit whether the CloneSite plugin is actually needed and remove it if not. For those requiring the functionality, implementing network-level access controls buys time until a patch arrives.
Related Articles
Apache HTTP/2 Double-Free Bug Enables DoS and RCE on Default Installs
CVE-2026-23918 in Apache 2.4.66 lets attackers crash servers or achieve code execution with just two HTTP/2 frames. Upgrade to 2.4.67 immediately.
May 6, 2026Palo Alto Firewalls Under Active Attack via Root-Level RCE Flaw
CVE-2026-0300 allows unauthenticated attackers to execute code as root on PA-Series and VM-Series firewalls. Patches coming May 13—here's how to mitigate now.
May 6, 2026Cisco Patches Four CVSS 9.9 Flaws in Identity Services Engine
Critical ISE vulnerabilities let authenticated users escalate to root. Read-only admin accounts can execute arbitrary commands on underlying OS.
Apr 20, 2026Apache ActiveMQ RCE Added to CISA KEV After Exploit Surge
CVE-2026-34197 lets attackers execute arbitrary code via ActiveMQ's Jolokia API. CISA mandates federal patching by April 30 as exploitation peaks.
Apr 20, 2026