CVE-2026-35452
MEDIUMCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Lifecycle Timeline
2Description
## Summary The `plugin/CloneSite/client.log.php` endpoint serves the clone operation log file without any authentication. Every other endpoint in the CloneSite plugin directory enforces `User::isAdmin()`. The log contains internal filesystem paths, remote server URLs, and SSH connection metadata. ## Details The entire file at `plugin/CloneSite/client.log.php`: ```php <?php include '../../videos/cache/clones/client.log'; ``` No authentication check. The log file is populated by `cloneClient.json.php` which writes operational details during clone operations: ```php // plugin/CloneSite/cloneClient.json.php:118 $log->add("Clone (2 of {$totalSteps}): Geting MySQL Dump file [$cmd]"); ``` The `$cmd` variable contains wget commands with internal filesystem paths, and rsync command templates with SSH connection details (username, IP, port). Compare with sibling endpoints: - `plugin/CloneSite/index.php` checks `User::isAdmin()` - `plugin/CloneSite/changeStatus.json.php` checks `User::isAdmin()` - `plugin/CloneSite/clones.json.php` checks `User::isAdmin()` - `plugin/CloneSite/delete.json.php` checks `User::isAdmin()` ## Proof of Concept ```bash curl "https://your-avideo-instance.com/plugin/CloneSite/client.log.php" ``` If the CloneSite feature has been used, the response contains wget commands, filesystem paths, SSH metadata, and SQL dump file locations. ## Impact Unauthenticated disclosure of internal infrastructure details that could aid targeted attacks against the clone source server. ## Recommended Fix Add an admin authentication check at `plugin/CloneSite/client.log.php`, before the include: ```php require_once '../../videos/configuration.php'; if (!User::isAdmin()) { http_response_code(403); die('Access denied'); } ``` --- *Found by [aisafe.io](https://aisafe.io)*
Analysis
Unauthenticated information disclosure in AVideo CloneSite plugin allows remote attackers to retrieve sensitive operational logs containing internal filesystem paths, remote server URLs, and SSH connection metadata via the client.log.php endpoint, which lacks authentication controls present in all sibling endpoints within the same plugin directory.
Sign in for full analysis, threat intelligence, and remediation guidance.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
GHSA-99j6-hj87-6fcf