AVideo: Unauthenticated OS Command Injection via base64Url in objects/getImage.php
Description
AVideo is a video-sharing Platform software. Prior to version 7.0, an unauthenticated attacker can execute arbitrary OS commands on the server by injecting shell command substitution into the base64Url GET parameter. This can lead to full server compromise, data exfiltration (e.g., configuration secrets, internal keys, credentials), and service disruption. This issue has been patched in version 7.0.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An unauthenticated OS command injection in AVideo-Encoder's `getImage.php` allows arbitrary command execution via the `base64Url` parameter, leading to full server compromise.
Root
Cause
In AVideo-Encoder prior to version 7.0, the file objects/getImage.php accepts a base64Url GET parameter. This value is Base64-decoded and then directly interpolated into a double-quoted ffmpeg shell command without any escaping of shell metacharacters. Although the application uses FILTER_VALIDATE_URL to validate the input, that only checks URL syntax and does not block shell metacharacters like backticks or $() command substitution sequences [1][3].
Exploitation
An unauthenticated attacker can send a crafted a URL such as https://target/objects/getImage.php?base64Url=$(malicious_command) (after Base64-decoding, the injected string becomes a shell substitution). Because the value is placed inside double quotes, the shell interprets the substitution and executes the enclosed command. The execution path uses shell_exec or nohup, allowing asynchronous command execution without any authentication requirement [1][3].
Impact
Successful exploitation grants the attacker arbitrary OS command execution on the server. This can lead to full server compromise, data exfiltration (configuration secrets, internal keys, credentials), and complete service disruption. The vulnerability is classified with a critical severity score [1][3].
Mitigation
The issue has been patched in AVideo-Encoder version 7.0 by applying strict shell argument escaping (e.g., escapeshellarg()) to all user-supplied values and avoiding double-quoted interpolation of untrusted input. For environments that cannot immediately update, workarounds include restricting access to objects/getImage.php at the web server/reverse proxy layer (IP allowlist, authentication, or disabling the endpoint) and applying WAF rules to block suspicious shell metacharacters [3].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | < 7.0.0 | 7.0.0 |
Affected products
2- WWBN/AVideo-Encoderv5Range: < 7.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-9j26-99jh-v26qghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-29058ghsaADVISORY
- github.com/WWBN/AVideo-Encoder/security/advisories/GHSA-9j26-99jh-v26qghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.