PT-2026-23005 · FFmpeg+1 · Ffmpeg+1

Published

2026-03-03

·

Updated

2026-03-09

·

CVE-2026-29058

CVSS v3.1
9.8
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions AVideo versions prior to 7.0
Description AVideo is a video-sharing Platform software susceptible to unauthenticated Remote Code Execution (RCE). An attacker can inject shell command substitution into the
base64Url
GET parameter, potentially leading to full server compromise, data exfiltration, and service disruption. The issue resides in the improper handling of user-supplied input within shell commands, specifically in files
objects/getImage.php
and
objects/security.php
, utilizing functions like
shell exec
and
nohup
. The root cause is the lack of proper shell escaping when decoding and interpolating the
base64Url
parameter into shell commands. The
FILTER VALIDATE URL
validation does not prevent shell metacharacters from being interpreted by the shell.
Recommendations Update to version 7.0 to resolve the issue. Restrict access to the
objects/getImage.php
file at the web server or reverse proxy layer. Apply Web Application Firewall (WAF) rules to block suspicious patterns and limit exposure.

Fix

RCE

OS Command Injection

Weakness Enumeration

Related Identifiers

CVE-2026-29058
GHSA-9J26-99JH-V26Q

Affected Products

Avideo
Ffmpeg