CVE-2026-41064

WWBN · AVideo

WWBN AVideo is vulnerable to server-side request forgery (SSRF) and potential command injection due to insufficient URL validation.

Executive summary

An incomplete fix in WWBN AVideo allows attackers to bypass URL validation, leading to potential server-side request forgery or command injection.

Vulnerability

The application fails to sanitize inputs for file_get_contents and curl operations, and its URL validation regex can be bypassed, leading to potential SSRF and RCE.

Business impact

Attackers can use this vulnerability to perform unauthorized requests from the server (SSRF) or execute arbitrary commands, leading to data theft or total system compromise. The CVSS score of 9.3 highlights the significant danger this poses to the application's hosting environment.

Remediation

Immediate Action: Apply the vendor-provided fix (commit 78bccae) or update to the latest version of AVideo.

Proactive Monitoring: Monitor outgoing network traffic from the AVideo server for suspicious requests to internal or external unauthorized endpoints.

Compensating Controls: Implement strict egress filtering on the server to prevent the application from making unauthorized requests to internal network segments.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Update the application immediately to ensure the security fix is applied. Organizations should also review their network security posture to ensure that even if the application is compromised, the impact of SSRF is minimized through egress filtering.