<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-41064 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-41064/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 00:16:28 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-41064/feed.xml" rel="self" type="application/rss+xml"/><item><title>WWBN AVideo Unauthenticated Remote Code Execution via test.php</title><link>https://feed.craftedsignal.io/briefs/2026-04-avideo-rce/</link><pubDate>Wed, 22 Apr 2026 00:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-avideo-rce/</guid><description>WWBN AVideo versions up to 29.0 contain an OS Command Injection vulnerability (CVE-2026-41064) in the `test.php` file, allowing unauthenticated remote code execution due to insufficient input sanitization, especially affecting `file_get_contents` and `curl` code paths.</description><content:encoded><![CDATA[<p>WWBN AVideo, an open-source video platform, is vulnerable to an unauthenticated remote code execution (RCE) flaw. This vulnerability, identified as CVE-2026-41064, exists in versions up to and including 29.0. The root cause is an incomplete fix applied to the <code>test.php</code> file. While the fix implemented <code>escapeshellarg</code> for the <code>wget</code> command, it neglected to sanitize input for the <code>file_get_contents</code> and <code>curl</code> code paths. Additionally, the URL validation regex <code>/^http/</code> is overly permissive, accepting malicious strings such as <code>httpevil[.]com</code>. Successful exploitation allows attackers to execute arbitrary commands on the server hosting the AVideo platform. The recommended remediation is to apply the updated fix detailed in commit 78bccae74634ead68aa6528d631c9ec4fd7aa536.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker sends a crafted HTTP request to the <code>test.php</code> endpoint.</li>
<li>The request includes a malicious URL, designed to exploit the insufficient input validation in the <code>file_get_contents</code> or <code>curl</code> code paths. For example, using <code>httpevil[.]com</code> to bypass the regex check <code>/^http/</code>.</li>
<li>The <code>test.php</code> script processes the request, attempting to retrieve content from the attacker-controlled URL using either <code>file_get_contents</code> or <code>curl</code>.</li>
<li>Due to the lack of proper sanitization, the malicious URL is interpreted as an OS command.</li>
<li>The server executes the attacker-supplied OS command.</li>
<li>The attacker gains arbitrary code execution on the AVideo server.</li>
<li>The attacker can then perform various malicious activities, such as installing malware, stealing sensitive data, or pivoting to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-41064) grants unauthenticated attackers the ability to execute arbitrary code on the affected AVideo server. This can lead to complete compromise of the server, including data theft, defacement, or use as a staging ground for further attacks. Given the platform&rsquo;s use in video hosting, successful attacks could impact numerous users and content creators relying on the vulnerable AVideo instance. The vulnerable regex <code>/^http/</code> and unsanitized functions leave the server open to mass exploitation if exposed to the public internet.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the updated fix detailed in commit 78bccae74634ead68aa6528d631c9ec4fd7aa536 to fully address the input validation issue in <code>test.php</code>.</li>
<li>Deploy the Sigma rule &ldquo;Detect AVideo test.php Command Injection Attempt&rdquo; to detect exploitation attempts in web server logs.</li>
<li>Monitor web server logs for requests to <code>test.php</code> containing suspicious URLs, especially those matching the <code>httpevil[.]com</code> pattern as documented in the IOCs.</li>
<li>Implement a more robust URL validation mechanism that properly sanitizes input before passing it to <code>file_get_contents</code> or <code>curl</code>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-41064</category><category>avideo</category><category>rce</category><category>command-injection</category></item></channel></rss>