<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-39370 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-39370/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 08 Apr 2026 00:08:47 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-39370/feed.xml" rel="self" type="application/rss+xml"/><item><title>WWBN AVideo SSRF Vulnerability via Incomplete CVE-2026-27732 Fix</title><link>https://feed.craftedsignal.io/briefs/2026-04-avideo-ssrf/</link><pubDate>Wed, 08 Apr 2026 00:08:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-avideo-ssrf/</guid><description>WWBN AVideo is vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete fix for CVE-2026-27732, allowing authenticated uploaders to bypass SSRF protection by providing a `downloadURL` with a common media extension, leading to internal response exfiltration.</description><content:encoded><![CDATA[<p>WWBN AVideo, a video-sharing platform, is susceptible to Server-Side Request Forgery (SSRF) vulnerability due to an incomplete patch for CVE-2026-27732. The vulnerability exists in the <code>objects/aVideoEncoder.json.php</code> script. An authenticated uploader can provide a malicious <code>downloadURL</code> containing a common media extension like <code>.mp4</code>, <code>.jpg</code>, <code>.gif</code>, or <code>.zip</code>, bypassing SSRF validation. This allows the attacker to force the server to fetch internal resources. The server fetches the specified URL using <code>url_get_contents()</code>, stores the response as media content, and makes it accessible through the <code>/videos/...</code> endpoint. This vulnerability, identified as CVE-2026-39370, affects AVideo versions 26.0 and earlier. Exploitation enables exfiltration of sensitive data from internal APIs and services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker logs in as a low-privilege authenticated user with upload privileges.</li>
<li>The attacker crafts a malicious <code>downloadURL</code> pointing to an internal resource (e.g., <code>http://127.0.0.1:9998/probe.mp4</code>).</li>
<li>The attacker sends a POST request to <code>/objects/aVideoEncoder.json.php</code> with the <code>downloadURL</code> and a valid <code>format</code> parameter (e.g., <code>mp4</code>).</li>
<li>AVideo&rsquo;s <code>downloadVideoFromDownloadURL()</code> function extracts the extension and incorrectly skips <code>isSSRFSafeURL()</code> validation due to the allowlisted extension.</li>
<li>The server fetches the content from the attacker-controlled <code>downloadURL</code> using <code>url_get_contents()</code>.</li>
<li>The fetched content is written into video storage.</li>
<li>The attacker retrieves the media metadata using <code>GET /objects/videos.json.php?showAll=1</code> to obtain the <code>videosURL.mp4.url</code>.</li>
<li>The attacker downloads the media URL and recovers the content from the internal resource.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an authenticated uploader to force the AVideo server to fetch internal resources and persist the response as media content. This Server-Side Request Forgery (SSRF) vulnerability allows internal response exfiltration from private APIs, admin endpoints, or other internal services reachable from the application host. The number of potential victims is related to the installations of AVideo with versions less than or equal to 26.0, and the sectors primarily affected are likely media and entertainment, as well as organizations utilizing AVideo for internal video hosting.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply <code>isSSRFSafeURL()</code> to all <code>downloadURL</code> inputs in <code>objects/aVideoEncoder.json.php</code>, regardless of file extension to remediate CVE-2026-39370.</li>
<li>Deploy the Sigma rule &ldquo;Detect AVideo SSRF Attempt via DownloadURL&rdquo; to identify potential exploitation attempts based on requests to <code>/objects/aVideoEncoder.json.php</code>.</li>
<li>Restrict upload-by-URL functionality to an explicit allowlist of trusted fetch origins.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>avideo</category><category>cve-2026-39370</category></item></channel></rss>