Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2485 articles · 104559 vulns · 38/41 feeds (7d)
← Back to list
5.3
CVE-2026-35450
composer · wwbn/avideo

AVideo: Unauthenticated FFmpeg Remote Server Status Disclosure via check.ffmpeg.json.php

Description

## Summary The `plugin/API/check.ffmpeg.json.php` endpoint probes the FFmpeg remote server configuration and returns connectivity status without any authentication. All sibling FFmpeg management endpoints (`kill.ffmpeg.json.php`, `list.ffmpeg.json.php`, `ffmpeg.php`) require `User::isAdmin()`. ## Details The entire file at `plugin/API/check.ffmpeg.json.php`: ```php <?php $configFile = __DIR__.'/../../videos/configuration.php'; require_once $configFile; header('Content-Type: application/json'); $obj = testFFMPEGRemote(); die(json_encode($obj)); ``` No `User::isAdmin()`, `User::isLogged()`, or any access control check exists. Compare with sibling endpoints in the same directory: - `kill.ffmpeg.json.php` checks `User::isAdmin()` - `list.ffmpeg.json.php` checks `User::isAdmin()` ## Proof of Concept ```bash curl "https://your-avideo-instance.com/plugin/API/check.ffmpeg.json.php" ``` Returns information about whether the platform uses a standalone FFmpeg server and its current reachability. ## Impact Infrastructure reconnaissance revealing the encoding architecture. Limited direct impact but aids targeted attack planning. ## Recommended Fix Add an admin authentication check at `plugin/API/check.ffmpeg.json.php:3`, after `require_once $configFile;`: ```php if (!User::isAdmin()) { forbiddenPage('Admin only'); } ``` --- *Found by [aisafe.io](https://aisafe.io)*

Affected Products

VendorProductVersions
composerwwbn/avideocomposer/wwbn/avideo: <= 26.0

References

  • https://github.com/advisories/GHSA-2vg4-rrx4-qcpq(advisory)
  • https://github.com/WWBN/AVideo/security/advisories/GHSA-2vg4-rrx4-qcpq
  • https://github.com/advisories/GHSA-2vg4-rrx4-qcpq
CVSS 3.15.3 MEDIUM
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CISA KEV❌ No
Actively exploited❌ No
CWECWE-306
PublishedApr 4, 2026
Tags
GHSA-2vg4-rrx4-qcpqcomposer
Trending Score0
Source articles0
Independent0
Info Completeness0/14
Missing: cve_id, title, description, vendor, product, versions, cvss, epss, cwe, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-35470EXP
OpenSTAManager has a SQL Injection via righe Parameter in confronta_righe Modals
Trending: 50
HIGHCVE-2026-35181EXP
WWBN AVideo Affected by CSRF on Player Skin Configuration via admin/playerUpdate.json.php
Trending: 47
HIGHCVE-2026-35179EXP
WWBN AVideo Unauthenticated Instagram Graph API Proxy via publishInstagram.json.php
Trending: 47
HIGHCVE-2026-29782
OpenSTAManager: Remote Code Execution via Insecure Deserialization in OAuth2
Trending: 24
NONECVE-2026-34989
CI4MS affected by Profile & User Management Full Account Takeover for All-Roles & Privilege-Escalation via Stored DOM XSS
Trending: 20

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 4, 2026
Discovered by ZDM
Apr 4, 2026