CVE-2023-49738: CWE-73: External Control of File Name or Path in WWBN AVideo
An information disclosure vulnerability exists in the image404Raw.php functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.
AI Analysis
Technical Summary
CVE-2023-49738 is an information disclosure vulnerability identified in the WWBN AVideo platform, specifically within the image404Raw.php script. The vulnerability is classified under CWE-73, which involves external control of file name or path. An attacker can craft a malicious HTTP request that manipulates the file path parameter in this script, leading to arbitrary file read on the server. This means the attacker can access files outside the intended directory scope, potentially exposing sensitive configuration files, credentials, or other private data stored on the server. The vulnerability affects the development master branch at commit 15fed957fb, indicating it may be present in development or pre-release versions rather than stable releases. The CVSS 3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) indicates that the vulnerability is remotely exploitable over the network without any privileges or user interaction, with a high impact on confidentiality but no impact on integrity or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild, suggesting the vulnerability is newly disclosed. However, the ease of exploitation and potential data exposure make it a significant risk. Attackers exploiting this flaw could harvest sensitive information that may facilitate further attacks or data breaches.
Potential Impact
For European organizations, the impact of CVE-2023-49738 can be substantial, particularly for entities relying on WWBN AVideo for video hosting, streaming, or media management. Unauthorized file reads can lead to leakage of sensitive information such as server configuration files, database credentials, or private user data, which can compromise confidentiality and privacy obligations under regulations like GDPR. This exposure can facilitate lateral movement within networks or enable further exploitation by revealing system internals. Media companies, educational institutions, and content providers using AVideo are at risk of reputational damage and regulatory penalties if sensitive data is disclosed. Since the vulnerability does not affect integrity or availability, direct service disruption is unlikely, but the confidentiality breach alone is critical. The lack of authentication requirements increases the risk of automated scanning and exploitation attempts, potentially leading to widespread data exposure if unmitigated.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. First, restrict access to the image404Raw.php endpoint using web application firewalls (WAFs) or access control lists to block suspicious or unauthorized requests. Implement strict input validation and sanitization on any file path parameters to prevent directory traversal or arbitrary file access. Monitor web server logs for unusual HTTP requests targeting image404Raw.php or attempts to access sensitive files. If feasible, isolate the AVideo application in a segmented network zone with limited access to critical backend systems. Regularly update to the latest stable versions of AVideo once patches addressing this vulnerability are released. Conduct internal code reviews and penetration testing focused on file path handling to identify similar weaknesses. Educate development and operations teams about CWE-73 risks and secure coding practices to prevent recurrence.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2023-49738: CWE-73: External Control of File Name or Path in WWBN AVideo
Description
An information disclosure vulnerability exists in the image404Raw.php functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.
AI-Powered Analysis
Technical Analysis
CVE-2023-49738 is an information disclosure vulnerability identified in the WWBN AVideo platform, specifically within the image404Raw.php script. The vulnerability is classified under CWE-73, which involves external control of file name or path. An attacker can craft a malicious HTTP request that manipulates the file path parameter in this script, leading to arbitrary file read on the server. This means the attacker can access files outside the intended directory scope, potentially exposing sensitive configuration files, credentials, or other private data stored on the server. The vulnerability affects the development master branch at commit 15fed957fb, indicating it may be present in development or pre-release versions rather than stable releases. The CVSS 3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) indicates that the vulnerability is remotely exploitable over the network without any privileges or user interaction, with a high impact on confidentiality but no impact on integrity or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild, suggesting the vulnerability is newly disclosed. However, the ease of exploitation and potential data exposure make it a significant risk. Attackers exploiting this flaw could harvest sensitive information that may facilitate further attacks or data breaches.
Potential Impact
For European organizations, the impact of CVE-2023-49738 can be substantial, particularly for entities relying on WWBN AVideo for video hosting, streaming, or media management. Unauthorized file reads can lead to leakage of sensitive information such as server configuration files, database credentials, or private user data, which can compromise confidentiality and privacy obligations under regulations like GDPR. This exposure can facilitate lateral movement within networks or enable further exploitation by revealing system internals. Media companies, educational institutions, and content providers using AVideo are at risk of reputational damage and regulatory penalties if sensitive data is disclosed. Since the vulnerability does not affect integrity or availability, direct service disruption is unlikely, but the confidentiality breach alone is critical. The lack of authentication requirements increases the risk of automated scanning and exploitation attempts, potentially leading to widespread data exposure if unmitigated.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. First, restrict access to the image404Raw.php endpoint using web application firewalls (WAFs) or access control lists to block suspicious or unauthorized requests. Implement strict input validation and sanitization on any file path parameters to prevent directory traversal or arbitrary file access. Monitor web server logs for unusual HTTP requests targeting image404Raw.php or attempts to access sensitive files. If feasible, isolate the AVideo application in a segmented network zone with limited access to critical backend systems. Regularly update to the latest stable versions of AVideo once patches addressing this vulnerability are released. Conduct internal code reviews and penetration testing focused on file path handling to identify similar weaknesses. Educate development and operations teams about CWE-73 risks and secure coding practices to prevent recurrence.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-11-30T22:10:08.294Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a473b6d939959c8021bfa
Added to database: 11/4/2025, 6:34:35 PM
Last enriched: 11/4/2025, 7:08:56 PM
Last updated: 12/20/2025, 5:14:04 PM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt
HighCVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.