VYPR
Medium severity5.3GHSA Advisory· Published May 18, 2026

AVideo CVE-2026-43881 incomplete fix - `objects/mention.json.php:17` is an unauthenticated user enumeration sibling that survives `d9cdc7024`

CVE-2026-45620

Description

CVE-2026-43881 fix d9cdc7024 patched users.json.php only. The same anti-pattern survives at master HEAD in:

objects/mention.json.php:17     $ignoreAdmin = true;
objects/mention.json.php:18     $users = User::getAllUsers($ignoreAdmin,
                                    ['name', 'email', 'user', 'channelName'], 'a');

No User::loginCheck(), no admin gate. Only entry guard: preg_match('/^@/', $_REQUEST['term']) and hard-coded rowCount=10.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Unauthenticated user enumeration in AVideo's objects/mention.json.php due to missing access control, exposing user names, emails, and channels.

Vulnerability

The vulnerability exists in objects/mention.json.php in AVideo platform versions up to and including 29.0. The file sets $ignoreAdmin = true on line 17 and calls User::getAllUsers() with no prior authentication check (User::loginCheck()) or admin gate. The only entry guard is a preg_match('/^@/', $_REQUEST['term']) and a hard-coded rowCount=10. This is the same anti-pattern that was partially fixed in users.json.php for CVE-2026-43881, but mention.json.php remains unpatched [1][2][3][4].

Exploitation

An unauthenticated attacker can send a request to objects/mention.json.php with a term parameter starting with @ (e.g., term=@). The script will return up to 10 user records containing name, email, user, and channelName fields. No authentication, session, or special privileges are required; the attacker only needs network access to the AVideo instance [3][4].

Impact

Successful exploitation allows an unauthenticated attacker to enumerate registered users, obtaining their display names, email addresses, usernames, and channel names. This information disclosure can be used for targeted phishing, social engineering, or further attacks against the platform. The confidentiality of user data is compromised, but integrity and availability are not directly affected [2][3][4].

Mitigation

As of the publication date (May 18, 2026), no official patch has been released for this vulnerability. The fix for the related CVE-2026-43881 only addressed users.json.php and did not cover mention.json.php. Users should monitor the AVideo repository for updates and consider applying a custom patch that adds User::loginCheck() and proper admin authorization before the vulnerable code path. Until a fix is available, restricting network access to the AVideo instance or disabling the mention functionality may reduce exposure [1][3][4].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.