PT-2026-23005 · FFmpeg+1 · Ffmpeg+1

Arkmarta

·

Published

2026-03-03

·

Updated

2026-04-16

·

CVE-2026-29058

CVSS v3.1

9.8

Critical

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions AVideo versions prior to 7.0
Description AVideo is a video-sharing Platform software susceptible to unauthenticated Remote Code Execution (RCE). An attacker can inject shell command substitution into the base64Url GET parameter, potentially leading to full server compromise, data exfiltration, and service disruption. The issue resides in the improper handling of user-supplied input within shell commands, specifically in files objects/getImage.php and objects/security.php, utilizing functions like shell exec and nohup. The root cause is the lack of proper shell escaping when decoding and interpolating the base64Url parameter into shell commands. The FILTER VALIDATE URL validation does not prevent shell metacharacters from being interpreted by the shell.
Recommendations Update to version 7.0 to resolve the issue. Restrict access to the objects/getImage.php file at the web server or reverse proxy layer. Apply Web Application Firewall (WAF) rules to block suspicious patterns and limit exposure.

Exploit

Fix

RCE

OS Command Injection

Weakness Enumeration

Related Identifiers

CVE-2026-29058
GHSA-9J26-99JH-V26Q

Affected Products

Avideo
Ffmpeg