AVideo Vulnerable to Remote Code Execution via Persistent PHP Temp File in Encoder downloadURL with Resolution Validation Abort
Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the downloadVideoFromDownloadURL() function in objects/aVideoEncoder.json.php saves remote content to a web-accessible temporary directory using the original URL's filename and extension (including .php). By providing an invalid resolution parameter, an attacker triggers an early die() via forbiddenPage() before the temp file can be moved or cleaned up, leaving an executable PHP file persistently accessible under the web root at videos/cache/tmpFile/. Commit 6da79b43484099a0b660d1544a63c07b633ed3a2 contains a patch.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | <= 26.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-8wf4-c4x3-h952ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33717ghsaADVISORY
- github.com/WWBN/AVideo/commit/6da79b43484099a0b660d1544a63c07b633ed3a2ghsax_refsource_MISCWEB
- github.com/WWBN/AVideo/security/advisories/GHSA-8wf4-c4x3-h952ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.