CVE-2026-41304
Description
WWBN AVideo is an open source video platform. In versions 29.0 and below, the cloneServer.json.php endpoint in the CloneSite plugin constructs shell commands using user-controlled input (url parameter) without proper sanitization. The input is directly concatenated into a wget command executed via exec(), allowing command injection. An attacker can inject arbitrary shell commands by breaking out of the intended URL context using shell metacharacters (e.g., ;). This leads to Remote Code Execution (RCE) on the server. Commit 473c609fc2defdea8b937b00e86ce88eba1f15bb contains a fix.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | <= 29.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/WWBN/AVideo/commit/473c609fc2defdea8b937b00e86ce88eba1f15bbnvdPatchWEB
- github.com/WWBN/AVideo/security/advisories/GHSA-xr6f-h4x7-r6qpnvdExploitMitigationVendor AdvisoryWEB
- github.com/advisories/GHSA-xr6f-h4x7-r6qpghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-41304ghsaADVISORY
News mentions
0No linked articles in our index yet.