<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Avideo — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/avideo/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/avideo/feed.xml" rel="self" type="application/rss+xml"/><item><title>WWBN AVideo Unauthenticated Path Traversal Vulnerability (CVE-2026-41058)</title><link>https://feed.craftedsignal.io/briefs/2026-04-avideo-path-traversal/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-avideo-path-traversal/</guid><description>WWBN AVideo versions 29.0 and below contain a path traversal vulnerability (CVE-2026-41058) in the CloneSite functionality, allowing unauthenticated attackers to delete arbitrary files via manipulation of the `deleteDump` parameter.</description><content:encoded><![CDATA[<p>WWBN AVideo is an open-source video platform. Versions 29.0 and below are vulnerable to a path traversal vulnerability (CVE-2026-41058) due to an incomplete fix for the <code>deleteDump</code> parameter in the CloneSite functionality. This vulnerability allows unauthenticated attackers to delete arbitrary files on the server by injecting <code>../../</code> sequences into the GET request. The vulnerability was reported on April 21, 2026, and a fix is available in commit 3c729717c26f160014a5c86b0b6accdbd613e7b2. Successful exploitation allows attackers to potentially disrupt service, delete sensitive data, or escalate privileges depending on the file permissions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an AVideo instance running version 29.0 or below.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the CloneSite functionality.</li>
<li>The attacker injects a path traversal sequence (e.g., <code>../../</code>) into the <code>deleteDump</code> parameter of the GET request.</li>
<li>The AVideo application fails to properly sanitize the <code>deleteDump</code> parameter.</li>
<li>The <code>unlink()</code> function is called with the attacker-controlled path, allowing deletion of arbitrary files.</li>
<li>The attacker uses the vulnerability to delete critical system files or configuration files.</li>
<li>The application or server becomes unstable or inoperable.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41058 allows unauthenticated attackers to delete arbitrary files on the AVideo server. This can lead to denial of service, data loss, or potential privilege escalation if critical system files are deleted. The vulnerability affects all AVideo instances running version 29.0 or below, potentially impacting a large number of users and organizations relying on the platform.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade AVideo instances to a version containing the fix from commit 3c729717c26f160014a5c86b0b6accdbd613e7b2 to address CVE-2026-41058.</li>
<li>Deploy the Sigma rule <code>Detect AVideo Path Traversal Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Implement web application firewall (WAF) rules to block requests containing path traversal sequences in the <code>deleteDump</code> parameter.</li>
<li>Monitor web server logs for suspicious activity related to the CloneSite functionality and the <code>deleteDump</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path traversal</category><category>cve-2026-41058</category><category>avideo</category><category>webserver</category></item><item><title>WWBN AVideo SSRF Vulnerability (CVE-2026-41055)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wwbn-avideo-ssrf/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wwbn-avideo-ssrf/</guid><description>WWBN AVideo versions 29.0 and below are vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete fix in the LiveLinks proxy, potentially allowing attackers to redirect traffic to internal endpoints.</description><content:encoded><![CDATA[<p>WWBN AVideo, an open-source video platform, is vulnerable to Server-Side Request Forgery (SSRF) in versions 29.0 and below. The vulnerability, identified as CVE-2026-41055, stems from an incomplete fix in the LiveLinks proxy. While the fix introduced <code>isSSRFSafeURL()</code> validation, it fails to address Time-of-Check Time-of-Use (TOCTOU) vulnerabilities related to DNS rebinding. This flaw allows attackers to bypass the intended SSRF protection by manipulating DNS responses between the validation check and the actual HTTP request, potentially redirecting traffic to internal, sensitive endpoints. The vulnerability can be remediated by applying the updated fix found in commit 8d8fc0cadb425835b4861036d589abcea4d78ee8. Exploitation could lead to information disclosure or unauthorized access to internal services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an AVideo instance running a vulnerable version (&lt;= 29.0).</li>
<li>Attacker crafts a malicious URL targeting the AVideo LiveLinks proxy feature.</li>
<li>The malicious URL is designed to leverage DNS rebinding techniques.</li>
<li>The AVideo server first validates the URL using <code>isSSRFSafeURL()</code>, which initially resolves to a safe, external IP address.</li>
<li>After validation, but before the HTTP request is made, the DNS record for the malicious URL is altered to point to an internal IP address.</li>
<li>The AVideo server, due to the TOCTOU vulnerability, now makes an HTTP request to the attacker-controlled internal IP address.</li>
<li>The attacker gains access to internal resources or services through the AVideo server.</li>
<li>Attacker exfiltrates sensitive data or pivots to other internal systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-41055) in WWBN AVideo could allow attackers to access sensitive internal resources that are not intended to be exposed to the public internet. An attacker could potentially read internal configuration files, access databases, or even execute commands on internal systems, depending on the exposed services. The specific impact will vary depending on the organization&rsquo;s internal network configuration and the services running behind the AVideo server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade WWBN AVideo to a version containing the complete SSRF fix, referencing commit 8d8fc0cadb425835b4861036d589abcea4d78ee8.</li>
<li>Implement network segmentation to limit the impact of potential SSRF vulnerabilities by restricting access from the AVideo server to only necessary internal resources.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious AVideo SSRF Attempt</code> to detect potential exploitation attempts via web server logs.</li>
<li>Monitor web server logs for unusual outbound connections from the AVideo server to internal IP addresses based on the <code>network_connection</code> log source.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>avideo</category><category>cve-2026-41055</category></item><item><title>WWBN AVideo Unauthenticated Remote Code Execution via test.php</title><link>https://feed.craftedsignal.io/briefs/2026-04-avideo-rce/</link><pubDate>Wed, 22 Apr 2026 00:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-avideo-rce/</guid><description>WWBN AVideo versions up to 29.0 contain an OS Command Injection vulnerability (CVE-2026-41064) in the `test.php` file, allowing unauthenticated remote code execution due to insufficient input sanitization, especially affecting `file_get_contents` and `curl` code paths.</description><content:encoded><![CDATA[<p>WWBN AVideo, an open-source video platform, is vulnerable to an unauthenticated remote code execution (RCE) flaw. This vulnerability, identified as CVE-2026-41064, exists in versions up to and including 29.0. The root cause is an incomplete fix applied to the <code>test.php</code> file. While the fix implemented <code>escapeshellarg</code> for the <code>wget</code> command, it neglected to sanitize input for the <code>file_get_contents</code> and <code>curl</code> code paths. Additionally, the URL validation regex <code>/^http/</code> is overly permissive, accepting malicious strings such as <code>httpevil[.]com</code>. Successful exploitation allows attackers to execute arbitrary commands on the server hosting the AVideo platform. The recommended remediation is to apply the updated fix detailed in commit 78bccae74634ead68aa6528d631c9ec4fd7aa536.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker sends a crafted HTTP request to the <code>test.php</code> endpoint.</li>
<li>The request includes a malicious URL, designed to exploit the insufficient input validation in the <code>file_get_contents</code> or <code>curl</code> code paths. For example, using <code>httpevil[.]com</code> to bypass the regex check <code>/^http/</code>.</li>
<li>The <code>test.php</code> script processes the request, attempting to retrieve content from the attacker-controlled URL using either <code>file_get_contents</code> or <code>curl</code>.</li>
<li>Due to the lack of proper sanitization, the malicious URL is interpreted as an OS command.</li>
<li>The server executes the attacker-supplied OS command.</li>
<li>The attacker gains arbitrary code execution on the AVideo server.</li>
<li>The attacker can then perform various malicious activities, such as installing malware, stealing sensitive data, or pivoting to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-41064) grants unauthenticated attackers the ability to execute arbitrary code on the affected AVideo server. This can lead to complete compromise of the server, including data theft, defacement, or use as a staging ground for further attacks. Given the platform&rsquo;s use in video hosting, successful attacks could impact numerous users and content creators relying on the vulnerable AVideo instance. The vulnerable regex <code>/^http/</code> and unsanitized functions leave the server open to mass exploitation if exposed to the public internet.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the updated fix detailed in commit 78bccae74634ead68aa6528d631c9ec4fd7aa536 to fully address the input validation issue in <code>test.php</code>.</li>
<li>Deploy the Sigma rule &ldquo;Detect AVideo test.php Command Injection Attempt&rdquo; to detect exploitation attempts in web server logs.</li>
<li>Monitor web server logs for requests to <code>test.php</code> containing suspicious URLs, especially those matching the <code>httpevil[.]com</code> pattern as documented in the IOCs.</li>
<li>Implement a more robust URL validation mechanism that properly sanitizes input before passing it to <code>file_get_contents</code> or <code>curl</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-41064</category><category>avideo</category><category>rce</category><category>command-injection</category></item><item><title>WWBN AVideo SSRF Vulnerability via Incomplete CVE-2026-27732 Fix</title><link>https://feed.craftedsignal.io/briefs/2026-04-avideo-ssrf/</link><pubDate>Wed, 08 Apr 2026 00:08:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-avideo-ssrf/</guid><description>WWBN AVideo is vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete fix for CVE-2026-27732, allowing authenticated uploaders to bypass SSRF protection by providing a `downloadURL` with a common media extension, leading to internal response exfiltration.</description><content:encoded><![CDATA[<p>WWBN AVideo, a video-sharing platform, is susceptible to Server-Side Request Forgery (SSRF) vulnerability due to an incomplete patch for CVE-2026-27732. The vulnerability exists in the <code>objects/aVideoEncoder.json.php</code> script. An authenticated uploader can provide a malicious <code>downloadURL</code> containing a common media extension like <code>.mp4</code>, <code>.jpg</code>, <code>.gif</code>, or <code>.zip</code>, bypassing SSRF validation. This allows the attacker to force the server to fetch internal resources. The server fetches the specified URL using <code>url_get_contents()</code>, stores the response as media content, and makes it accessible through the <code>/videos/...</code> endpoint. This vulnerability, identified as CVE-2026-39370, affects AVideo versions 26.0 and earlier. Exploitation enables exfiltration of sensitive data from internal APIs and services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker logs in as a low-privilege authenticated user with upload privileges.</li>
<li>The attacker crafts a malicious <code>downloadURL</code> pointing to an internal resource (e.g., <code>http://127.0.0.1:9998/probe.mp4</code>).</li>
<li>The attacker sends a POST request to <code>/objects/aVideoEncoder.json.php</code> with the <code>downloadURL</code> and a valid <code>format</code> parameter (e.g., <code>mp4</code>).</li>
<li>AVideo&rsquo;s <code>downloadVideoFromDownloadURL()</code> function extracts the extension and incorrectly skips <code>isSSRFSafeURL()</code> validation due to the allowlisted extension.</li>
<li>The server fetches the content from the attacker-controlled <code>downloadURL</code> using <code>url_get_contents()</code>.</li>
<li>The fetched content is written into video storage.</li>
<li>The attacker retrieves the media metadata using <code>GET /objects/videos.json.php?showAll=1</code> to obtain the <code>videosURL.mp4.url</code>.</li>
<li>The attacker downloads the media URL and recovers the content from the internal resource.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an authenticated uploader to force the AVideo server to fetch internal resources and persist the response as media content. This Server-Side Request Forgery (SSRF) vulnerability allows internal response exfiltration from private APIs, admin endpoints, or other internal services reachable from the application host. The number of potential victims is related to the installations of AVideo with versions less than or equal to 26.0, and the sectors primarily affected are likely media and entertainment, as well as organizations utilizing AVideo for internal video hosting.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply <code>isSSRFSafeURL()</code> to all <code>downloadURL</code> inputs in <code>objects/aVideoEncoder.json.php</code>, regardless of file extension to remediate CVE-2026-39370.</li>
<li>Deploy the Sigma rule &ldquo;Detect AVideo SSRF Attempt via DownloadURL&rdquo; to identify potential exploitation attempts based on requests to <code>/objects/aVideoEncoder.json.php</code>.</li>
<li>Restrict upload-by-URL functionality to an explicit allowlist of trusted fetch origins.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>avideo</category><category>cve-2026-39370</category></item><item><title>WWBN AVideo Unauthenticated decryptString Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-avideo-decryptstring/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-avideo-decryptstring/</guid><description>WWBN AVideo, up to version 26.0, contains an improper authentication vulnerability (CVE-2026-33512) in the API plugin's `decryptString` action, allowing unauthenticated users to decrypt publicly accessible ciphertext and potentially recover protected tokens/metadata.</description><content:encoded><![CDATA[<p>WWBN AVideo is an open-source video platform. Versions up to and including 26.0 are vulnerable to an improper authentication issue within the API plugin. The <code>decryptString</code> action, intended for internal decryption processes, is exposed without any authentication requirements. Attackers can exploit this vulnerability to submit ciphertext, which is publicly accessible through endpoints like <code>view/url2Embed.json.php</code>, and receive the corresponding plaintext. Successful exploitation allows…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-33512</category><category>avideo</category><category>improper-authentication</category><category>api-vulnerability</category></item><item><title>WWBN AVideo SQL Injection Vulnerability (CVE-2026-33723)</title><link>https://feed.craftedsignal.io/briefs/2024-05-avideo-sqli/</link><pubDate>Mon, 23 Mar 2026 19:16:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-avideo-sqli/</guid><description>WWBN AVideo platform versions up to 26.0 are vulnerable to SQL injection (CVE-2026-33723), allowing authenticated attackers to inject arbitrary SQL commands via the 'user_id' POST parameter and extract sensitive data such as password hashes, API keys, and encryption salts.</description><content:encoded><![CDATA[<p>WWBN AVideo, an open-source video platform, is susceptible to a critical SQL injection vulnerability (CVE-2026-33723) affecting versions up to and including 26.0. The vulnerability resides within the <code>Subscribe::save()</code> method located in <code>objects/subscribe.php</code>. The application directly concatenates the <code>$this-&gt;users_id</code> property into an INSERT SQL query without proper sanitization or parameterized binding. This property originates from the <code>$_POST['user_id']</code> parameter in both…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>avideo</category><category>sqli</category><category>cve-2026-33723</category><category>web-application</category></item><item><title>WWBN AVideo Privilege Escalation via Moderator Account</title><link>https://feed.craftedsignal.io/briefs/2024-01-22-avideo-privilege-escalation/</link><pubDate>Mon, 23 Mar 2026 19:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-22-avideo-privilege-escalation/</guid><description>WWBN AVideo platform versions up to 26.0 allows a 'Videos Moderator' to escalate privileges and perform unauthorized video management operations due to inconsistent authorization checks.</description><content:encoded><![CDATA[<p>WWBN AVideo, an open-source video platform, is vulnerable to a privilege escalation flaw. Specifically, AVideo versions up to and including 26.0, a user with &ldquo;Videos Moderator&rdquo; permissions can perform unauthorized video management operations. The vulnerability stems from the inconsistent authorization checks within the platform&rsquo;s code. While the &ldquo;Videos Moderator&rdquo; permission is intended to only permit changes to video publicity (Active, Inactive, Unlisted), the flaw allows for full video editing operations, including ownership transfer and video deletion. This vulnerability was patched in commit 838e16818c793779406ecbf34ebaeba9830e33f8. Successful exploitation of this flaw could lead to data loss and unauthorized content manipulation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to a legitimate &ldquo;Videos Moderator&rdquo; account on the AVideo platform.</li>
<li>The attacker leverages the <code>Permissions::canModerateVideos()</code> function within <code>videoAddNew.json.php</code> to initiate video editing operations beyond the intended scope of the moderator role.</li>
<li>The attacker modifies the ownership of a target video, transferring it to an account controlled by the attacker.</li>
<li>The attacker, now the owner of the target video, bypasses the intended authorization controls within the <code>videoDelete.json.php</code> script.</li>
<li>The attacker invokes the <code>videoDelete.json.php</code> script to delete the video.</li>
<li>The platform deletes the video, due to the successful ownership transfer and the insufficient permission checks in the delete function.</li>
<li>The attacker repeats the process to delete any video on the platform.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker with limited &ldquo;Videos Moderator&rdquo; privileges to escalate their access and perform unauthorized video management operations. This can lead to the deletion of arbitrary videos on the platform, resulting in data loss, service disruption, and potential reputational damage. The number of affected installations is unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch from commit 838e16818c793779406ecbf34ebaeba9830e33f8 to address the vulnerability in AVideo (CVE-2026-33650).</li>
<li>Monitor web server logs for requests to <code>videoAddNew.json.php</code> and <code>videoDelete.json.php</code> originating from &ldquo;Videos Moderator&rdquo; accounts, looking for anomalous activity (see Sigma rule below).</li>
<li>Implement stricter authorization controls for video management operations within the AVideo platform to prevent privilege escalation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>avideo</category><category>privilege-escalation</category><category>web-application</category></item><item><title>AVideo Unauthenticated Server-Side Request Forgery Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-24-avideo-ssrf/</link><pubDate>Mon, 23 Mar 2026 17:16:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-24-avideo-ssrf/</guid><description>AVideo versions up to 26.0 are vulnerable to an unauthenticated server-side request forgery (SSRF) vulnerability in the `plugin/Live/test.php` endpoint, allowing attackers to make the server send arbitrary HTTP requests, potentially exposing internal resources and cloud metadata.</description><content:encoded><![CDATA[<p>AVideo, an open-source video platform, is affected by a critical unauthenticated Server-Side Request Forgery (SSRF) vulnerability (CVE-2026-33502) in versions up to and including 26.0. The vulnerability exists within the <code>plugin/Live/test.php</code> file. An attacker can exploit this flaw to force the AVideo server to make HTTP requests to arbitrary URLs.  Successful exploitation allows attackers to probe internal network services, potentially accessing sensitive internal HTTP resources, cloud metadata endpoints, and other protected assets. The patch for this vulnerability is included in commit 1e6cf03e93b5a5318204b010ea28440b0d9a5ab3. This vulnerability poses a significant risk, as it does not require authentication and can lead to the exposure of sensitive information and potential compromise of internal infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an AVideo instance running a vulnerable version (&lt;= 26.0).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>plugin/Live/test.php</code> endpoint.</li>
<li>The crafted request includes a URL parameter pointing to an internal resource (e.g., <code>http://localhost/admin</code>).</li>
<li>The AVideo server, without proper validation, processes the request and sends an HTTP request to the attacker-specified URL.</li>
<li>The server receives the HTTP response from the internal resource.</li>
<li>The server may return the content of the internal resource to the attacker, depending on the AVideo application logic.</li>
<li>The attacker analyzes the returned content, potentially gaining access to sensitive information like configuration files, API keys, or internal service endpoints.</li>
<li>The attacker leverages the exposed information to further compromise the AVideo instance or the internal network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability (CVE-2026-33502) can lead to the exposure of sensitive internal resources, including configuration files, API keys, and cloud metadata.  This can enable attackers to gain unauthorized access to internal systems, escalate privileges, and potentially compromise the entire infrastructure. The number of affected AVideo instances is currently unknown, but given its open-source nature, it is potentially widespread across various sectors. A successful attack can lead to data breaches, service disruption, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade AVideo instances to a patched version containing commit 1e6cf03e93b5a5318204b010ea28440b0d9a5ab3 to remediate CVE-2026-33502.</li>
<li>Deploy the Sigma rule <code>Detect AVideo SSRF Attempt via plugin Live Test</code> to identify potential exploitation attempts targeting the vulnerable endpoint.</li>
<li>Implement network segmentation to restrict access to internal resources and mitigate the impact of successful SSRF exploitation.</li>
<li>Review webserver logs for suspicious requests to <code>plugin/Live/test.php</code> with unusual URL parameters (log source: webserver).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ssrf</category><category>avideo</category><category>cve-2026-33502</category><category>webserver</category></item><item><title>WWBN AVideo Unauthorized File Access and Deletion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-avideo-file-access/</link><pubDate>Mon, 23 Mar 2026 16:16:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-avideo-file-access/</guid><description>WWBN AVideo platform versions up to 26.0 are vulnerable to unauthorized file access and deletion, where an authenticated user with upload permissions can exploit the `objects/import.json.php` endpoint by manipulating the `fileURI` parameter to steal private video files, read adjacent text files, and delete `.mp4` and other writable files on the filesystem.</description><content:encoded><![CDATA[<p>WWBN AVideo, an open-source video platform, is vulnerable to unauthorized file access and deletion in versions up to and including 26.0. The vulnerability resides in the <code>objects/import.json.php</code> endpoint, which lacks proper directory restriction on the user-controlled <code>fileURI</code> POST parameter. This allows an authenticated user with upload permissions to bypass intended security measures and access or delete files outside of their authorized scope. The vulnerability was addressed in commit e110ff542acdd7e3b81bdd02b8402b9f6a61ad78. This vulnerability allows for the potential compromise of sensitive video content and adjacent data. Exploitation can lead to data theft and potential data loss. Defenders should prioritize patching and monitoring for suspicious activity targeting this endpoint.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the AVideo platform with a valid user account that possesses upload permissions.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>objects/import.json.php</code> endpoint.</li>
<li>The POST request includes the <code>fileURI</code> parameter, which is set to a path pointing to a target video file or adjacent text file outside the user&rsquo;s designated directory.</li>
<li>The server-side code processes the request without performing adequate directory restriction checks on the <code>fileURI</code> parameter.</li>
<li>If the target is a video file, the server imports the video file into the attacker&rsquo;s account, allowing the attacker to steal private video files.</li>
<li>If the target is a readable text file adjacent to a video, the attacker can access its contents via the import mechanism.</li>
<li>If the targeted file (either video or adjacent text file) is writable by the web server process, the attacker can trigger its deletion by including the appropriate parameters in the crafted request.</li>
<li>The attacker successfully exfiltrates the stolen video data or sensitive information from accessed files, or causes data loss due to file deletion.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to several critical consequences. An attacker can steal private video files belonging to other users, resulting in a breach of confidentiality and potential reputational damage. The ability to read adjacent <code>.txt</code>/<code>.html</code>/<code>.htm</code> files can expose sensitive information, such as configuration files or credentials. Furthermore, the capability to delete <code>.mp4</code> files and adjacent text files can cause data loss and disruption of service. The number of affected users depends on the specific deployment and the number of users with private video content.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch from commit e110ff542acdd7e3b81bdd02b8402b9f6a61ad78 to remediate CVE-2026-33493.</li>
<li>Deploy the Sigma rule to your web server logs to detect attempts to access arbitrary files using the <code>fileURI</code> parameter in requests to <code>objects/import.json.php</code>.</li>
<li>Monitor web server logs for unusual file access patterns, particularly requests to <code>objects/import.json.php</code> with <code>fileURI</code> parameters containing directory traversal sequences like &ldquo;../&rdquo;.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>avideo</category><category>file-access</category><category>vulnerability</category></item></channel></rss>