PT-2026-23005 · FFmpeg+1 · Ffmpeg+1
Published
2026-03-03
·
Updated
2026-03-09
·
CVE-2026-29058
CVSS v3.1
9.8
9.8
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
AVideo versions prior to 7.0
Description
AVideo is a video-sharing Platform software susceptible to unauthenticated Remote Code Execution (RCE). An attacker can inject shell command substitution into the
base64Url GET parameter, potentially leading to full server compromise, data exfiltration, and service disruption. The issue resides in the improper handling of user-supplied input within shell commands, specifically in files objects/getImage.php and objects/security.php, utilizing functions like shell exec and nohup. The root cause is the lack of proper shell escaping when decoding and interpolating the base64Url parameter into shell commands. The FILTER VALIDATE URL validation does not prevent shell metacharacters from being interpreted by the shell.Recommendations
Update to version 7.0 to resolve the issue.
Restrict access to the
objects/getImage.php file at the web server or reverse proxy layer.
Apply Web Application Firewall (WAF) rules to block suspicious patterns and limit exposure.Fix
RCE
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
CVE-2026-29058
GHSA-9J26-99JH-V26Q
Affected Products
Avideo
Ffmpeg
References · 14
- https://nvd.nist.gov/vuln/detail/CVE-2026-29058 · Security Note
- https://osv.dev/vulnerability/GHSA-9j26-99jh-v26q · Vendor Advisory
- https://github.com/WWBN/AVideo-Encoder/security/advisories/GHSA-9j26-99jh-v26q⭐ 157 🔗 192 · Note
- https://github.com/WWBN/AVideo-Encoder⭐ 157 🔗 192 · Note
- https://t.me/CVEtracker/46576 · Telegram Post
- https://twitter.com/CveFindCom/status/2029824664646660541 · Twitter Post
- https://twitter.com/UndercodeUpdate/status/2029898454789484814 · Twitter Post
- https://twitter.com/TheHackerWire/status/2029830786653082049 · Twitter Post
- https://twitter.com/pulsepatchio/status/2029571285785645531 · Twitter Post
- https://twitter.com/VulmonFeeds/status/2029907176555229214 · Twitter Post
- https://reddit.com/r/KibernetinisSaugumas/comments/1ro5sch/zeroclick_komand%C5%B3_%C4%AFterpimas_avideo_platformoje · Reddit Post
- https://twitter.com/CVEnew/status/2029975548248895676 · Twitter Post
- https://twitter.com/the_yellow_fall/status/2029736628470624327 · Twitter Post
- https://twitter.com/StrongKeepCyber/status/2030856325643506137 · Twitter Post