CVE-2026-35449
MEDIUMCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Lifecycle Timeline
2Description
## Summary The `install/test.php` diagnostic script has its CLI-only access guard disabled by commenting out the `die()` statement. The script remains accessible via HTTP after installation, exposing video viewer statistics including IP addresses, session IDs, and user agents to unauthenticated visitors. ## Details The disabled guard at `install/test.php:5-7`: ```php if (!isCommandLineInterface()) { //return die('Command Line only'); } ``` The script also enables verbose error reporting: ```php error_reporting(E_ALL); ini_set('display_errors', '1'); ``` It then queries `VideoStatistic::getLastStatistics()` and outputs the result via `var_dump()`: ```php $resp = VideoStatistic::getLastStatistics(getVideos_id(), User::getId()); var_dump($resp); ``` The `VideoStatistic` object contains: `ip` (viewer IP address), `session_id`, `user_agent`, `users_id`, and JSON metadata. The `display_errors=1` setting also leaks internal filesystem paths in any PHP warnings. The `install/` directory is not restricted by `.htaccess` (it only disables directory listing via `Options -Indexes`) and no web server rules block access to individual PHP files in this directory. ## Proof of Concept ```bash # Request viewer stats for video ID 1 curl "https://your-avideo-instance.com/install/test.php?videos_id=1" ``` Confirmed accessible on live AVideo instances (HTTP 200). ## Impact Unauthenticated disclosure of viewer IP addresses (PII under GDPR), session identifiers, and user agents. The enabled `display_errors` also reveals internal server paths on errors. - **CWE**: CWE-200 (Exposure of Sensitive Information) - **Severity**: Low ## Recommended Fix Uncomment the CLI guard at `install/test.php:6` to restore the intended access restriction: ```php if (!isCommandLineInterface()) { return die('Command Line only'); } ``` --- *Found by [aisafe.io](https://aisafe.io)*
Analysis
AVideo install/test.php diagnostic script exposes sensitive viewer statistics including IP addresses, session IDs, and user agents to unauthenticated remote attackers due to a disabled CLI-only access guard. The vulnerability allows any visitor to retrieve video viewer data via HTTP GET requests without authentication, combined with enabled error reporting that leaks internal filesystem paths. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
GHSA-hg8q-8wqr-35xx