AVideo has an OS Command Injection via $() Shell Substitution Bypass in sanitizeFFmpegCommand()
Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the sanitizeFFmpegCommand() function in plugin/API/standAlone/functions.php is designed to prevent OS command injection in ffmpeg commands by stripping dangerous shell metacharacters (&&, ;, |, ` `, <, >). However, it fails to strip $() (bash command substitution syntax). Since the sanitized command is executed inside a double-quoted sh -c context in execAsync()`, an attacker who can craft a valid encrypted payload can achieve arbitrary command execution on the standalone encoder server. Commit 25c8ab90269e3a01fb4cf205b40a373487f022e1 contains a patch.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | <= 26.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-pmj8-r2j7-xg6cghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33482ghsaADVISORY
- github.com/WWBN/AVideo/commit/25c8ab90269e3a01fb4cf205b40a373487f022e1ghsax_refsource_MISCWEB
- github.com/WWBN/AVideo/security/advisories/GHSA-pmj8-r2j7-xg6cghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.