Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34433: CWE-94 Improper Control of Generation of Code ('Code Injection') in World Wide Broadcast Network AVideo

0
Critical
VulnerabilityCVE-2025-34433cvecve-2025-34433cwe-94
Published: Fri Dec 19 2025 (12/19/2025, 15:37:39 UTC)
Source: CVE Database V5
Vendor/Project: World Wide Broadcast Network
Product: AVideo

Description

AVideo versions 14.3.1 prior to 20.1 contain an unauthenticated remote code execution vulnerability caused by predictable generation of an installation salt using PHP uniqid(). The installation timestamp is exposed via a public endpoint, and a derived hash identifier is accessible through unauthenticated API responses, allowing attackers to brute-force the remaining entropy. The recovered salt can then be used to encrypt a malicious payload supplied to a notification API endpoint that evaluates attacker-controlled input, resulting in arbitrary code execution as the web server user.

AI-Powered Analysis

AILast updated: 12/19/2025, 15:58:04 UTC

Technical Analysis

CVE-2025-34433 is a severe vulnerability affecting AVideo versions 14.3.1 prior to 20.1, caused by improper control over code generation (CWE-94). The root cause is the use of PHP's uniqid() function to generate an installation salt, which is predictable and lacks sufficient entropy. This salt is critical for encrypting payloads sent to a notification API endpoint that evaluates input in a manner allowing code execution. The installation timestamp, which is part of the salt generation process, is publicly exposed via an endpoint, and a derived hash identifier is also accessible through unauthenticated API responses. Attackers can leverage these data points to brute-force the remaining entropy of the salt. Once the salt is recovered, attackers can encrypt malicious payloads that, when submitted to the notification API, are executed by the web server user, resulting in remote code execution without any authentication or user interaction. The vulnerability impacts confidentiality, integrity, and availability, as attackers can execute arbitrary commands, potentially leading to full system compromise. The CVSS 4.0 score is 9.3 (critical), reflecting the ease of exploitation and the severe impact. No patches are currently linked, and no known exploits have been reported in the wild, but the vulnerability is publicly disclosed and should be considered urgent for remediation.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those deploying AVideo as a video hosting or streaming platform accessible over the internet. Successful exploitation can lead to full compromise of the web server, allowing attackers to steal sensitive data, disrupt services, or pivot to internal networks. This can result in data breaches, service outages, reputational damage, and regulatory non-compliance under GDPR due to unauthorized access and data exposure. Organizations relying on AVideo for internal or external communications, media delivery, or content management are particularly vulnerable. The unauthenticated nature of the exploit means attackers can attempt exploitation at scale, increasing the risk of widespread attacks. The lack of user interaction and low attack complexity further exacerbate the threat. Given the criticality, European entities must prioritize detection and mitigation to protect their infrastructure and data.

Mitigation Recommendations

1. Upgrade AVideo installations to version 20.1 or later where this vulnerability is fixed. 2. If immediate upgrade is not possible, restrict access to the public endpoints exposing the installation timestamp and hash identifier via network controls such as firewalls or web application firewalls (WAFs). 3. Implement strict input validation and sanitization on the notification API endpoint to prevent execution of attacker-controlled code. 4. Monitor logs for unusual API requests, especially those targeting the notification endpoint or attempting to brute-force salt values. 5. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect and block suspicious code execution attempts. 6. Conduct regular security audits and penetration tests focusing on API endpoints and code injection vectors. 7. Isolate the AVideo server in a segmented network zone with minimal privileges to limit impact if compromised. 8. Educate development teams on secure coding practices, particularly avoiding predictable salts and unsafe code evaluation. 9. Maintain up-to-date backups and incident response plans to recover quickly from potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.601Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694572a4133fda1465b9f67c

Added to database: 12/19/2025, 3:43:32 PM

Last enriched: 12/19/2025, 3:58:04 PM

Last updated: 12/19/2025, 4:54:33 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats