Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. wwbn/avideo
  4. ›
  5. CVE-2026-33483

CVE-2026-33483: AVideo Affected by Unauthenticated Disk Space Exhaustion via Unlimited Temp File Creation in aVideoEncoderChunk.json.php

March 20, 2026

The aVideoEncoderChunk.json.php endpoint is a completely standalone PHP script with no authentication, no framework includes, and no resource limits. An unauthenticated remote attacker can send arbitrary POST data which is written to persistent temp files in /tmp/ with no size cap, no rate limiting, and no cleanup mechanism. This allows trivial disk space exhaustion leading to denial of service of the entire server.

References

  • github.com/WWBN/AVideo
  • github.com/WWBN/AVideo/security/advisories/GHSA-vv7w-qf5c-734w
  • github.com/advisories/GHSA-vv7w-qf5c-734w
  • nvd.nist.gov/vuln/detail/CVE-2026-33483

Code Behaviors & Features

Detect and mitigate CVE-2026-33483 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 26.0

Solution

Unfortunately, there is no solution available yet.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-770: Allocation of Resources Without Limits or Throttling

Source file

packagist/wwbn/avideo/CVE-2026-33483.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:17:31 +0000.