Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34433: CWE-94 Improper Control of Generation of Code ('Code Injection') in World Wide Broadcast Network AVideo

0
Critical
VulnerabilityCVE-2025-34433cvecve-2025-34433cwe-94
Published: Fri Dec 19 2025 (12/19/2025, 15:37:39 UTC)
Source: CVE Database V5
Vendor/Project: World Wide Broadcast Network
Product: AVideo

Description

CVE-2025-34433 is a critical unauthenticated remote code execution vulnerability in AVideo versions prior to 20. 1. It arises from the predictable generation of an installation salt using PHP uniqid(), combined with exposed installation timestamps and hash identifiers accessible without authentication. Attackers can brute-force the salt, then craft malicious payloads that are encrypted and sent to a notification API endpoint which evaluates attacker-controlled input, leading to arbitrary code execution as the web server user. This vulnerability requires no authentication or user interaction and has a CVSS 4. 0 score of 9. 3, indicating critical severity. Exploitation could lead to full system compromise, data theft, or service disruption. European organizations using affected AVideo versions are at significant risk, especially those in media, education, or content delivery sectors. Mitigation requires upgrading to version 20.

AI-Powered Analysis

AILast updated: 12/26/2025, 16:34:57 UTC

Technical Analysis

CVE-2025-34433 is a critical remote code execution vulnerability affecting AVideo versions 14.3.1 prior to 20.1, a video platform developed by World Wide Broadcast Network. The root cause is the use of PHP's uniqid() function to generate an installation salt, which is predictable due to its reliance on timestamps and low entropy. The installation timestamp is publicly exposed via an endpoint, and a derived hash identifier is also accessible through unauthenticated API responses. This information allows an attacker to brute-force the remaining entropy of the salt. Once the salt is recovered, the attacker can craft a malicious payload encrypted with this salt and send it to a notification API endpoint that evaluates the input without proper sanitization or validation. This leads to arbitrary code execution on the web server with the privileges of the web server user. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects network attack vector, low complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the vulnerability poses a severe risk due to the ease of exploitation and potential for full system compromise. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code), highlighting the dangers of evaluating attacker-controlled input and insecure cryptographic practices. No official patches are linked yet, but upgrading to version 20.1 or later is recommended.

Potential Impact

For European organizations, this vulnerability could lead to complete compromise of AVideo servers, allowing attackers to execute arbitrary code, steal sensitive data, disrupt video services, or use compromised servers as pivot points for further network intrusion. Media companies, educational institutions, and content delivery networks relying on AVideo for streaming or video hosting are particularly at risk. The breach of confidentiality could expose user data and intellectual property, while integrity and availability impacts could disrupt critical services. Given the unauthenticated nature of the exploit, attackers can operate remotely without prior access, increasing the threat landscape. The potential for widespread disruption in sectors dependent on video content delivery could have economic and reputational consequences. Additionally, compromised servers could be leveraged for further attacks on European infrastructure or used in botnets, amplifying the threat.

Mitigation Recommendations

Immediate mitigation involves upgrading AVideo installations to version 20.1 or later, where this vulnerability is addressed. Until upgrades are possible, organizations should restrict access to the installation timestamp and notification API endpoints via network segmentation, firewall rules, or IP whitelisting to prevent unauthenticated access. Implementing Web Application Firewalls (WAFs) with rules to detect and block suspicious payloads targeting the notification API can reduce risk. Review and enhance input validation and sanitization on all API endpoints to prevent code injection. Replace insecure salt generation methods like PHP uniqid() with cryptographically secure random number generators. Conduct regular security audits and penetration tests focusing on API endpoints and code evaluation functions. Monitor logs for unusual API activity or brute-force attempts on the salt. Finally, establish incident response plans specific to web server compromises to quickly contain and remediate any exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.601Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694572a4133fda1465b9f67c

Added to database: 12/19/2025, 3:43:32 PM

Last enriched: 12/26/2025, 4:34:57 PM

Last updated: 2/6/2026, 4:09:33 PM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats