CVE-2026-35449

MEDIUM
2026-04-04 https://github.com/WWBN/AVideo GHSA-hg8q-8wqr-35xx
5.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Lifecycle Timeline

2
Analysis Generated
Apr 04, 2026 - 06:30 vuln.today
CVE Published
Apr 04, 2026 - 06:16 nvd
MEDIUM 5.3

Description

## Summary The `install/test.php` diagnostic script has its CLI-only access guard disabled by commenting out the `die()` statement. The script remains accessible via HTTP after installation, exposing video viewer statistics including IP addresses, session IDs, and user agents to unauthenticated visitors. ## Details The disabled guard at `install/test.php:5-7`: ```php if (!isCommandLineInterface()) { //return die('Command Line only'); } ``` The script also enables verbose error reporting: ```php error_reporting(E_ALL); ini_set('display_errors', '1'); ``` It then queries `VideoStatistic::getLastStatistics()` and outputs the result via `var_dump()`: ```php $resp = VideoStatistic::getLastStatistics(getVideos_id(), User::getId()); var_dump($resp); ``` The `VideoStatistic` object contains: `ip` (viewer IP address), `session_id`, `user_agent`, `users_id`, and JSON metadata. The `display_errors=1` setting also leaks internal filesystem paths in any PHP warnings. The `install/` directory is not restricted by `.htaccess` (it only disables directory listing via `Options -Indexes`) and no web server rules block access to individual PHP files in this directory. ## Proof of Concept ```bash # Request viewer stats for video ID 1 curl "https://your-avideo-instance.com/install/test.php?videos_id=1" ``` Confirmed accessible on live AVideo instances (HTTP 200). ## Impact Unauthenticated disclosure of viewer IP addresses (PII under GDPR), session identifiers, and user agents. The enabled `display_errors` also reveals internal server paths on errors. - **CWE**: CWE-200 (Exposure of Sensitive Information) - **Severity**: Low ## Recommended Fix Uncomment the CLI guard at `install/test.php:6` to restore the intended access restriction: ```php if (!isCommandLineInterface()) { return die('Command Line only'); } ``` --- *Found by [aisafe.io](https://aisafe.io)*

Analysis

AVideo install/test.php diagnostic script exposes sensitive viewer statistics including IP addresses, session IDs, and user agents to unauthenticated remote attackers due to a disabled CLI-only access guard. The vulnerability allows any visitor to retrieve video viewer data via HTTP GET requests without authentication, combined with enabled error reporting that leaks internal filesystem paths. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Priority Score

27
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +26
POC: 0

Share

CVE-2026-35449 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy