CVE-2023-47862: CWE-73: External Control of File Name or Path in WWBN AVideo
A local file inclusion vulnerability exists in the getLanguageFromBrowser functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can send a series of HTTP requests to trigger this vulnerability.
AI Analysis
Technical Summary
CVE-2023-47862 is a critical security vulnerability identified in the WWBN AVideo platform, specifically in the getLanguageFromBrowser functionality of the development master branch at commit 15fed957fb. This vulnerability is classified under CWE-73, which involves external control of file name or path, leading to a local file inclusion (LFI) flaw. An attacker can exploit this by crafting malicious HTTP requests that manipulate the file path parameters processed by the application, allowing arbitrary files to be included and executed on the server. This can lead to remote code execution (RCE) without requiring any authentication or user interaction, making it highly exploitable over the network. The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity with high impact on confidentiality, integrity, and availability. The flaw stems from insufficient validation or sanitization of user-supplied input in the getLanguageFromBrowser function, which is intended to detect the user's language preference from browser headers or parameters. By exploiting this, attackers can execute arbitrary code, potentially gaining full control over the affected server. Although no public exploits are reported yet, the vulnerability's nature and ease of exploitation make it a significant risk. The affected version is the dev master commit 15fed957fb of WWBN AVideo, a video streaming and management platform. Organizations using this version or derivatives should consider immediate remediation. The lack of available patches at the time of disclosure necessitates temporary mitigations such as restricting access to vulnerable endpoints, implementing strict input validation, and monitoring for anomalous HTTP requests that may indicate exploitation attempts.
Potential Impact
The impact of CVE-2023-47862 on European organizations can be severe. Successful exploitation leads to arbitrary code execution on servers running vulnerable versions of WWBN AVideo, potentially allowing attackers to take full control of the system. This compromises confidentiality by exposing sensitive video content, user data, and system credentials. Integrity is affected as attackers can modify or delete content, inject malicious code, or alter system configurations. Availability may be disrupted through denial-of-service conditions or ransomware deployment. Given the critical CVSS score and no authentication requirement, attackers can remotely exploit this vulnerability at scale. European organizations relying on AVideo for video hosting, streaming, or content management—such as media companies, educational institutions, and corporate communications—face risks of data breaches, service outages, and reputational damage. Additionally, compromised servers could be leveraged as pivot points for lateral movement within networks or for launching further attacks. The absence of known exploits in the wild currently provides a window for proactive defense, but the threat remains urgent due to the vulnerability's characteristics.
Mitigation Recommendations
To mitigate CVE-2023-47862, European organizations should take the following specific actions: 1) Immediately identify and inventory all instances of WWBN AVideo, particularly those running the vulnerable dev master commit 15fed957fb. 2) Apply any available patches or updates from WWBN as soon as they are released; if no official patch exists, consider rolling back to a previous stable version not affected by this vulnerability. 3) Implement strict input validation and sanitization on the getLanguageFromBrowser function or any endpoints processing language or file path parameters to prevent path traversal or file inclusion attacks. 4) Restrict network access to the AVideo management interface and related endpoints using firewalls or web application firewalls (WAFs) to block suspicious or malformed HTTP requests. 5) Monitor logs and network traffic for unusual patterns indicative of exploitation attempts, such as repeated requests with suspicious path parameters. 6) Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect LFI and RCE attack signatures. 7) Conduct security awareness and incident response drills focused on this vulnerability to ensure rapid detection and remediation. 8) Consider isolating AVideo servers in segmented network zones to limit potential lateral movement if compromised. These targeted measures go beyond generic advice by focusing on the specific vulnerable functionality and attack vectors involved.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2023-47862: CWE-73: External Control of File Name or Path in WWBN AVideo
Description
A local file inclusion vulnerability exists in the getLanguageFromBrowser functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can send a series of HTTP requests to trigger this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2023-47862 is a critical security vulnerability identified in the WWBN AVideo platform, specifically in the getLanguageFromBrowser functionality of the development master branch at commit 15fed957fb. This vulnerability is classified under CWE-73, which involves external control of file name or path, leading to a local file inclusion (LFI) flaw. An attacker can exploit this by crafting malicious HTTP requests that manipulate the file path parameters processed by the application, allowing arbitrary files to be included and executed on the server. This can lead to remote code execution (RCE) without requiring any authentication or user interaction, making it highly exploitable over the network. The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity with high impact on confidentiality, integrity, and availability. The flaw stems from insufficient validation or sanitization of user-supplied input in the getLanguageFromBrowser function, which is intended to detect the user's language preference from browser headers or parameters. By exploiting this, attackers can execute arbitrary code, potentially gaining full control over the affected server. Although no public exploits are reported yet, the vulnerability's nature and ease of exploitation make it a significant risk. The affected version is the dev master commit 15fed957fb of WWBN AVideo, a video streaming and management platform. Organizations using this version or derivatives should consider immediate remediation. The lack of available patches at the time of disclosure necessitates temporary mitigations such as restricting access to vulnerable endpoints, implementing strict input validation, and monitoring for anomalous HTTP requests that may indicate exploitation attempts.
Potential Impact
The impact of CVE-2023-47862 on European organizations can be severe. Successful exploitation leads to arbitrary code execution on servers running vulnerable versions of WWBN AVideo, potentially allowing attackers to take full control of the system. This compromises confidentiality by exposing sensitive video content, user data, and system credentials. Integrity is affected as attackers can modify or delete content, inject malicious code, or alter system configurations. Availability may be disrupted through denial-of-service conditions or ransomware deployment. Given the critical CVSS score and no authentication requirement, attackers can remotely exploit this vulnerability at scale. European organizations relying on AVideo for video hosting, streaming, or content management—such as media companies, educational institutions, and corporate communications—face risks of data breaches, service outages, and reputational damage. Additionally, compromised servers could be leveraged as pivot points for lateral movement within networks or for launching further attacks. The absence of known exploits in the wild currently provides a window for proactive defense, but the threat remains urgent due to the vulnerability's characteristics.
Mitigation Recommendations
To mitigate CVE-2023-47862, European organizations should take the following specific actions: 1) Immediately identify and inventory all instances of WWBN AVideo, particularly those running the vulnerable dev master commit 15fed957fb. 2) Apply any available patches or updates from WWBN as soon as they are released; if no official patch exists, consider rolling back to a previous stable version not affected by this vulnerability. 3) Implement strict input validation and sanitization on the getLanguageFromBrowser function or any endpoints processing language or file path parameters to prevent path traversal or file inclusion attacks. 4) Restrict network access to the AVideo management interface and related endpoints using firewalls or web application firewalls (WAFs) to block suspicious or malformed HTTP requests. 5) Monitor logs and network traffic for unusual patterns indicative of exploitation attempts, such as repeated requests with suspicious path parameters. 6) Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect LFI and RCE attack signatures. 7) Conduct security awareness and incident response drills focused on this vulnerability to ensure rapid detection and remediation. 8) Consider isolating AVideo servers in segmented network zones to limit potential lateral movement if compromised. These targeted measures go beyond generic advice by focusing on the specific vulnerable functionality and attack vectors involved.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-11-30T22:26:21.151Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a47376d939959c8021b42
Added to database: 11/4/2025, 6:34:31 PM
Last enriched: 11/4/2025, 7:03:17 PM
Last updated: 12/13/2025, 6:40:39 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14622: SQL Injection in code-projects Student File Management System
MediumCVE-2025-14623: SQL Injection in code-projects Student File Management System
MediumCVE-2025-14621: SQL Injection in code-projects Student File Management System
MediumCVE-2025-14620: SQL Injection in code-projects Student File Management System
MediumCVE-2025-14619: SQL Injection in code-projects Student File Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.