AVideo CVE-2026-43881 incomplete fix - `objects/mention.json.php:17` is an unauthenticated user enumeration sibling that survives `d9cdc7024`
Description
CVE-2026-43881 fix d9cdc7024 patched users.json.php only. The same anti-pattern survives at master HEAD in:
objects/mention.json.php:17 $ignoreAdmin = true;
objects/mention.json.php:18 $users = User::getAllUsers($ignoreAdmin,
['name', 'email', 'user', 'channelName'], 'a');
No User::loginCheck(), no admin gate. Only entry guard: preg_match('/^@/', $_REQUEST['term']) and hard-coded rowCount=10.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Unauthenticated user enumeration in AVideo's objects/mention.json.php due to missing access control, exposing user names, emails, and channels.
Vulnerability
The vulnerability exists in objects/mention.json.php in AVideo platform versions up to and including 29.0. The file sets $ignoreAdmin = true on line 17 and calls User::getAllUsers() with no prior authentication check (User::loginCheck()) or admin gate. The only entry guard is a preg_match('/^@/', $_REQUEST['term']) and a hard-coded rowCount=10. This is the same anti-pattern that was partially fixed in users.json.php for CVE-2026-43881, but mention.json.php remains unpatched [1][2][3][4].
Exploitation
An unauthenticated attacker can send a request to objects/mention.json.php with a term parameter starting with @ (e.g., term=@). The script will return up to 10 user records containing name, email, user, and channelName fields. No authentication, session, or special privileges are required; the attacker only needs network access to the AVideo instance [3][4].
Impact
Successful exploitation allows an unauthenticated attacker to enumerate registered users, obtaining their display names, email addresses, usernames, and channel names. This information disclosure can be used for targeted phishing, social engineering, or further attacks against the platform. The confidentiality of user data is compromised, but integrity and availability are not directly affected [2][3][4].
Mitigation
As of the publication date (May 18, 2026), no official patch has been released for this vulnerability. The fix for the related CVE-2026-43881 only addressed users.json.php and did not cover mention.json.php. Users should monitor the AVideo repository for updates and consider applying a custom patch that adds User::loginCheck() and proper admin authorization before the vulnerable code path. Until a fix is available, restricting network access to the AVideo instance or disabling the mention functionality may reduce exposure [1][3][4].
- GitHub - WWBN/AVideo: Create Your Own Broadcast Network With AVideo Platform Open-Source. OAVP OVP
- CVE-2026-43881 - GitHub Advisory Database
- AVideo CVE-2026-43881 incomplete fix - `objects/mention.json.php:17` is an unauthenticated user enumeration sibling that survives `d9cdc7024`
- CVE-2026-45620 - GitHub Advisory Database
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.