CVE-2023-49864: CWE-73: External Control of File Name or Path in WWBN AVideo
An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_image` parameter.
AI Analysis
Technical Summary
CVE-2023-49864 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the WWBN AVideo platform, specifically in the aVideoEncoderReceiveImage.json.php script responsible for image uploads. The flaw is triggered by the downloadURL_image parameter, which accepts external input that is not properly validated or sanitized, enabling an attacker to craft a malicious HTTP request to read arbitrary files from the server's filesystem. This leads to information disclosure, potentially exposing sensitive configuration files, credentials, or other private data stored on the server. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N), and it affects the dev master commit 15fed957fb version of AVideo. The CVSS 3.1 score is 6.5, reflecting a medium severity with a high confidentiality impact (C:H), no integrity (I:N), and no availability (A:N) impact. Although no public exploits have been reported, the vulnerability poses a risk to organizations using this version of AVideo, particularly in environments where sensitive data is stored or where the server is accessible to untrusted users. The root cause is insufficient validation of file path inputs, allowing directory traversal or arbitrary file read attacks. Remediation would involve implementing strict input validation, sanitizing the downloadURL_image parameter, and applying access controls to limit exposure.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information such as internal configuration files, user data, or credentials stored on AVideo servers. This exposure could facilitate further attacks, including privilege escalation or lateral movement within the network. Organizations relying on AVideo for video content management or streaming services may face confidentiality breaches, potentially violating GDPR requirements regarding data protection and privacy. The impact is particularly significant for entities handling sensitive or regulated data, such as media companies, educational institutions, or government agencies using AVideo. While the vulnerability does not directly affect system integrity or availability, the loss of confidentiality can damage organizational reputation and lead to compliance penalties. Since exploitation requires some level of authentication, insider threats or compromised accounts pose a higher risk. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the need for proactive mitigation.
Mitigation Recommendations
To mitigate CVE-2023-49864, organizations should first verify if they are running the affected dev master commit 15fed957fb version of WWBN AVideo and upgrade to a patched or stable release once available. In the absence of an official patch, implement strict input validation and sanitization on the downloadURL_image parameter to prevent directory traversal or arbitrary file path manipulation. Employ allowlisting of acceptable file paths or names and reject any input containing suspicious characters such as '../' sequences. Restrict access to the aVideoEncoderReceiveImage.json.php endpoint to trusted users or internal networks only, using network segmentation and firewall rules. Monitor logs for unusual access patterns or attempts to exploit this parameter. Additionally, enforce the principle of least privilege on accounts with access to the AVideo platform to reduce the risk of exploitation by low-privilege users. Conduct regular security assessments and code reviews focusing on file handling functions to identify similar vulnerabilities. Finally, ensure compliance with data protection regulations by safeguarding sensitive information exposed through this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2023-49864: CWE-73: External Control of File Name or Path in WWBN AVideo
Description
An information disclosure vulnerability exists in the aVideoEncoderReceiveImage.json.php image upload functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.This vulnerability is triggered by the `downloadURL_image` parameter.
AI-Powered Analysis
Technical Analysis
CVE-2023-49864 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the WWBN AVideo platform, specifically in the aVideoEncoderReceiveImage.json.php script responsible for image uploads. The flaw is triggered by the downloadURL_image parameter, which accepts external input that is not properly validated or sanitized, enabling an attacker to craft a malicious HTTP request to read arbitrary files from the server's filesystem. This leads to information disclosure, potentially exposing sensitive configuration files, credentials, or other private data stored on the server. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N), and it affects the dev master commit 15fed957fb version of AVideo. The CVSS 3.1 score is 6.5, reflecting a medium severity with a high confidentiality impact (C:H), no integrity (I:N), and no availability (A:N) impact. Although no public exploits have been reported, the vulnerability poses a risk to organizations using this version of AVideo, particularly in environments where sensitive data is stored or where the server is accessible to untrusted users. The root cause is insufficient validation of file path inputs, allowing directory traversal or arbitrary file read attacks. Remediation would involve implementing strict input validation, sanitizing the downloadURL_image parameter, and applying access controls to limit exposure.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information such as internal configuration files, user data, or credentials stored on AVideo servers. This exposure could facilitate further attacks, including privilege escalation or lateral movement within the network. Organizations relying on AVideo for video content management or streaming services may face confidentiality breaches, potentially violating GDPR requirements regarding data protection and privacy. The impact is particularly significant for entities handling sensitive or regulated data, such as media companies, educational institutions, or government agencies using AVideo. While the vulnerability does not directly affect system integrity or availability, the loss of confidentiality can damage organizational reputation and lead to compliance penalties. Since exploitation requires some level of authentication, insider threats or compromised accounts pose a higher risk. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the need for proactive mitigation.
Mitigation Recommendations
To mitigate CVE-2023-49864, organizations should first verify if they are running the affected dev master commit 15fed957fb version of WWBN AVideo and upgrade to a patched or stable release once available. In the absence of an official patch, implement strict input validation and sanitization on the downloadURL_image parameter to prevent directory traversal or arbitrary file path manipulation. Employ allowlisting of acceptable file paths or names and reject any input containing suspicious characters such as '../' sequences. Restrict access to the aVideoEncoderReceiveImage.json.php endpoint to trusted users or internal networks only, using network segmentation and firewall rules. Monitor logs for unusual access patterns or attempts to exploit this parameter. Additionally, enforce the principle of least privilege on accounts with access to the AVideo platform to reduce the risk of exploitation by low-privilege users. Conduct regular security assessments and code reviews focusing on file handling functions to identify similar vulnerabilities. Finally, ensure compliance with data protection regulations by safeguarding sensitive information exposed through this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-11-30T18:43:03.139Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a473b6d939959c8021c0a
Added to database: 11/4/2025, 6:34:35 PM
Last enriched: 11/4/2025, 7:10:01 PM
Last updated: 12/20/2025, 5:15:02 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt
HighCVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.