<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-41058 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-41058/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-41058/feed.xml" rel="self" type="application/rss+xml"/><item><title>WWBN AVideo Unauthenticated Path Traversal Vulnerability (CVE-2026-41058)</title><link>https://feed.craftedsignal.io/briefs/2026-04-avideo-path-traversal/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-avideo-path-traversal/</guid><description>WWBN AVideo versions 29.0 and below contain a path traversal vulnerability (CVE-2026-41058) in the CloneSite functionality, allowing unauthenticated attackers to delete arbitrary files via manipulation of the `deleteDump` parameter.</description><content:encoded><![CDATA[<p>WWBN AVideo is an open-source video platform. Versions 29.0 and below are vulnerable to a path traversal vulnerability (CVE-2026-41058) due to an incomplete fix for the <code>deleteDump</code> parameter in the CloneSite functionality. This vulnerability allows unauthenticated attackers to delete arbitrary files on the server by injecting <code>../../</code> sequences into the GET request. The vulnerability was reported on April 21, 2026, and a fix is available in commit 3c729717c26f160014a5c86b0b6accdbd613e7b2. Successful exploitation allows attackers to potentially disrupt service, delete sensitive data, or escalate privileges depending on the file permissions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an AVideo instance running version 29.0 or below.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the CloneSite functionality.</li>
<li>The attacker injects a path traversal sequence (e.g., <code>../../</code>) into the <code>deleteDump</code> parameter of the GET request.</li>
<li>The AVideo application fails to properly sanitize the <code>deleteDump</code> parameter.</li>
<li>The <code>unlink()</code> function is called with the attacker-controlled path, allowing deletion of arbitrary files.</li>
<li>The attacker uses the vulnerability to delete critical system files or configuration files.</li>
<li>The application or server becomes unstable or inoperable.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41058 allows unauthenticated attackers to delete arbitrary files on the AVideo server. This can lead to denial of service, data loss, or potential privilege escalation if critical system files are deleted. The vulnerability affects all AVideo instances running version 29.0 or below, potentially impacting a large number of users and organizations relying on the platform.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade AVideo instances to a version containing the fix from commit 3c729717c26f160014a5c86b0b6accdbd613e7b2 to address CVE-2026-41058.</li>
<li>Deploy the Sigma rule <code>Detect AVideo Path Traversal Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Implement web application firewall (WAF) rules to block requests containing path traversal sequences in the <code>deleteDump</code> parameter.</li>
<li>Monitor web server logs for suspicious activity related to the CloneSite functionality and the <code>deleteDump</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path traversal</category><category>cve-2026-41058</category><category>avideo</category><category>webserver</category></item></channel></rss>