8.9

CVSS4.0

CVE-2026-41304 - WWBN AVideo vulnerable to RCE caused by clonesite plugin

WWBN AVideo is an open source video platform. In versions 29.0 and below, the `cloneServer.json.php` endpoint in the CloneSite plugin constructs shell commands using user-controlled input (`url` parameter) without proper sanitization. The input is directly concatenated into a `wget` command execute…

📅 Published: April 21, 2026, 11:07 p.m. 🔄 Last Modified: April 24, 2026, 3:11 p.m.

9.3

CVSS3.1

CVE-2026-41064 - AVideo has an incomplete fix for CVE-2026-33502 (Command Injection)

WWBN AVideo is an open source video platform. In versions up to and including 29.0, an incomplete fix for AVideo's `test.php` adds `escapeshellarg` for wget but leaves the `file_get_contents` and `curl` code paths unsanitized, and the URL validation regex `/^http/` accepts strings like `httpevil[.]…

📅 Published: April 21, 2026, 11:04 p.m. 🔄 Last Modified: April 24, 2026, 3:10 p.m.

5.4

CVSS3.1

CVE-2026-41063 - WWBN AVideo has incomplete fix for CVE-2026-33500 (XSS)

WWBN AVideo is an open source video platform. In versions 29.0 and below, an incomplete XSS fix in AVideo's `ParsedownSafeWithLinks` class overrides `inlineMarkup` for raw HTML but does not override `inlineLink()` or `inlineUrlTag()`, allowing `javascript:` URLs in markdown link syntax to bypass sa…

📅 Published: April 21, 2026, 10:59 p.m. 🔄 Last Modified: April 24, 2026, 3:08 p.m.

6.5

CVSS3.1

CVE-2026-41062 - WWBN/AVideo has an incomplete fix for a directory traversal bypass via query string in ReceiveImage…

WWBN AVideo is an open source video platform. In versions 29.0 and below, the directory traversal fix introduced in commit 2375eb5e0 for `objects/aVideoEncoderReceiveImage.json.php` only checks the URL path component (via `parse_url($url, PHP_URL_PATH)`) for `..` sequences. However, the downstream …

📅 Published: April 21, 2026, 10:57 p.m. 🔄 Last Modified: April 24, 2026, 3:08 p.m.

5.4

CVSS3.1

CVE-2026-41061 - WWBN AVideo Vulnerable to stored XSS via Unanchored Duration Regex in Video Encoder Receiver

WWBN AVideo is an open source video platform. In versions 29.0 and below, the `isValidDuration()` regex at `objects/video.php:918` uses `/^[0-9]{1,2}:[0-9]{1,2}:[0-9]{1,2}/` without a `$` end anchor, allowing arbitrary HTML/JavaScript to be appended after a valid duration prefix. The crafted durati…

📅 Published: April 21, 2026, 10:49 p.m. 🔄 Last Modified: April 24, 2026, 3:08 p.m.

7.7

CVSS3.1

CVE-2026-41060 - AVideo's SSRF via same-domain hostname with alternate port bypasses isSSRFSafeURL

WWBN AVideo is an open source video platform. In versions 29.0 and below, the `isSSRFSafeURL()` function in `objects/functions.php` contains a same-domain shortcircuit (lines 4290-4296) that allows any URL whose hostname matches `webSiteRootURL` to bypass all SSRF protections. Because the check com…

📅 Published: April 21, 2026, 10:44 p.m. 🔄 Last Modified: April 24, 2026, 3:08 p.m.

8.1

CVSS3.1

CVE-2026-41058 - AVideo has an incomplete fix for CVE-2026-33293 (Path Traversal) in AVideo

WWBN AVideo is an open source video platform. In versions 29.0 and below, the incomplete fix for AVideo's CloneSite `deleteDump` parameter does not apply path traversal filtering, allowing `unlink()` of arbitrary files via `../../` sequences in the GET parameter. Commit 3c729717c26f160014a5c86b0b6a…

📅 Published: April 21, 2026, 10:43 p.m. 🔄 Last Modified: April 24, 2026, 3:07 p.m.

7.2

CVSS4.0

CVE-2026-5845 - Improper authorization fallback allows scoped user-to-server token installation escape in GitHub En…

An improper authorization vulnerability in scoped user-to-server (ghu_) token authorization in GitHub Enterprise Server allows an authenticated attacker to access private repositories outside the intended installation scope, which can include write operations, via an authorization fallback that tre…

📅 Published: April 21, 2026, 10:42 p.m. 🔄 Last Modified: April 22, 2026, 6:04 p.m.

7.1

CVSS3.1

CVE-2026-41057 - AVideo has CORS Origin Reflection Bypass via plugin/API/router.php and allowOrigin(true) that Expos…

WWBN AVideo is an open source video platform. In versions 29.0 and below, the CORS origin validation fix in commit `986e64aad` is incomplete. Two separate code paths still reflect arbitrary `Origin` headers with credentials allowed for all `/api/*` endpoints: (1) `plugin/API/router.php` lines 4-8 u…

📅 Published: April 21, 2026, 10:37 p.m. 🔄 Last Modified: April 24, 2026, 3:07 p.m.

8.1

CVSS3.1

CVE-2026-41056 - AVideos has CORS Origin Reflection with Credentials on Sensitive API Endpoints that Enables Cross-O…

WWBN AVideo is an open source video platform. In versions 29.0 and below, the `allowOrigin($allowAll=true)` function in `objects/functions.php` reflects any arbitrary `Origin` header back in `Access-Control-Allow-Origin` along with `Access-Control-Allow-Credentials: true`. This function is called b…

📅 Published: April 21, 2026, 10:35 p.m. 🔄 Last Modified: April 23, 2026, 4:05 p.m.
Total resulsts: 346628
Page 92 of 34,663
« previous page » next page
Filters