CVE-2025-34433: CWE-94 Improper Control of Generation of Code ('Code Injection') in World Wide Broadcast Network AVideo
AVideo versions 14.3.1 prior to 20.1 contain an unauthenticated remote code execution vulnerability caused by predictable generation of an installation salt using PHP uniqid(). The installation timestamp is exposed via a public endpoint, and a derived hash identifier is accessible through unauthenticated API responses, allowing attackers to brute-force the remaining entropy. The recovered salt can then be used to encrypt a malicious payload supplied to a notification API endpoint that evaluates attacker-controlled input, resulting in arbitrary code execution as the web server user.
AI Analysis
Technical Summary
CVE-2025-34433 is a severe vulnerability affecting AVideo versions 14.3.1 prior to 20.1, caused by improper control over code generation (CWE-94). The root cause is the use of PHP's uniqid() function to generate an installation salt, which is predictable and lacks sufficient entropy. This salt is critical for encrypting payloads sent to a notification API endpoint that evaluates input in a manner allowing code execution. The installation timestamp, which is part of the salt generation process, is publicly exposed via an endpoint, and a derived hash identifier is also accessible through unauthenticated API responses. Attackers can leverage these data points to brute-force the remaining entropy of the salt. Once the salt is recovered, attackers can encrypt malicious payloads that, when submitted to the notification API, are executed by the web server user, resulting in remote code execution without any authentication or user interaction. The vulnerability impacts confidentiality, integrity, and availability, as attackers can execute arbitrary commands, potentially leading to full system compromise. The CVSS 4.0 score is 9.3 (critical), reflecting the ease of exploitation and the severe impact. No patches are currently linked, and no known exploits have been reported in the wild, but the vulnerability is publicly disclosed and should be considered urgent for remediation.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those deploying AVideo as a video hosting or streaming platform accessible over the internet. Successful exploitation can lead to full compromise of the web server, allowing attackers to steal sensitive data, disrupt services, or pivot to internal networks. This can result in data breaches, service outages, reputational damage, and regulatory non-compliance under GDPR due to unauthorized access and data exposure. Organizations relying on AVideo for internal or external communications, media delivery, or content management are particularly vulnerable. The unauthenticated nature of the exploit means attackers can attempt exploitation at scale, increasing the risk of widespread attacks. The lack of user interaction and low attack complexity further exacerbate the threat. Given the criticality, European entities must prioritize detection and mitigation to protect their infrastructure and data.
Mitigation Recommendations
1. Upgrade AVideo installations to version 20.1 or later where this vulnerability is fixed. 2. If immediate upgrade is not possible, restrict access to the public endpoints exposing the installation timestamp and hash identifier via network controls such as firewalls or web application firewalls (WAFs). 3. Implement strict input validation and sanitization on the notification API endpoint to prevent execution of attacker-controlled code. 4. Monitor logs for unusual API requests, especially those targeting the notification endpoint or attempting to brute-force salt values. 5. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect and block suspicious code execution attempts. 6. Conduct regular security audits and penetration tests focusing on API endpoints and code injection vectors. 7. Isolate the AVideo server in a segmented network zone with minimal privileges to limit impact if compromised. 8. Educate development teams on secure coding practices, particularly avoiding predictable salts and unsafe code evaluation. 9. Maintain up-to-date backups and incident response plans to recover quickly from potential compromises.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland
CVE-2025-34433: CWE-94 Improper Control of Generation of Code ('Code Injection') in World Wide Broadcast Network AVideo
Description
AVideo versions 14.3.1 prior to 20.1 contain an unauthenticated remote code execution vulnerability caused by predictable generation of an installation salt using PHP uniqid(). The installation timestamp is exposed via a public endpoint, and a derived hash identifier is accessible through unauthenticated API responses, allowing attackers to brute-force the remaining entropy. The recovered salt can then be used to encrypt a malicious payload supplied to a notification API endpoint that evaluates attacker-controlled input, resulting in arbitrary code execution as the web server user.
AI-Powered Analysis
Technical Analysis
CVE-2025-34433 is a severe vulnerability affecting AVideo versions 14.3.1 prior to 20.1, caused by improper control over code generation (CWE-94). The root cause is the use of PHP's uniqid() function to generate an installation salt, which is predictable and lacks sufficient entropy. This salt is critical for encrypting payloads sent to a notification API endpoint that evaluates input in a manner allowing code execution. The installation timestamp, which is part of the salt generation process, is publicly exposed via an endpoint, and a derived hash identifier is also accessible through unauthenticated API responses. Attackers can leverage these data points to brute-force the remaining entropy of the salt. Once the salt is recovered, attackers can encrypt malicious payloads that, when submitted to the notification API, are executed by the web server user, resulting in remote code execution without any authentication or user interaction. The vulnerability impacts confidentiality, integrity, and availability, as attackers can execute arbitrary commands, potentially leading to full system compromise. The CVSS 4.0 score is 9.3 (critical), reflecting the ease of exploitation and the severe impact. No patches are currently linked, and no known exploits have been reported in the wild, but the vulnerability is publicly disclosed and should be considered urgent for remediation.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those deploying AVideo as a video hosting or streaming platform accessible over the internet. Successful exploitation can lead to full compromise of the web server, allowing attackers to steal sensitive data, disrupt services, or pivot to internal networks. This can result in data breaches, service outages, reputational damage, and regulatory non-compliance under GDPR due to unauthorized access and data exposure. Organizations relying on AVideo for internal or external communications, media delivery, or content management are particularly vulnerable. The unauthenticated nature of the exploit means attackers can attempt exploitation at scale, increasing the risk of widespread attacks. The lack of user interaction and low attack complexity further exacerbate the threat. Given the criticality, European entities must prioritize detection and mitigation to protect their infrastructure and data.
Mitigation Recommendations
1. Upgrade AVideo installations to version 20.1 or later where this vulnerability is fixed. 2. If immediate upgrade is not possible, restrict access to the public endpoints exposing the installation timestamp and hash identifier via network controls such as firewalls or web application firewalls (WAFs). 3. Implement strict input validation and sanitization on the notification API endpoint to prevent execution of attacker-controlled code. 4. Monitor logs for unusual API requests, especially those targeting the notification endpoint or attempting to brute-force salt values. 5. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect and block suspicious code execution attempts. 6. Conduct regular security audits and penetration tests focusing on API endpoints and code injection vectors. 7. Isolate the AVideo server in a segmented network zone with minimal privileges to limit impact if compromised. 8. Educate development teams on secure coding practices, particularly avoiding predictable salts and unsafe code evaluation. 9. Maintain up-to-date backups and incident response plans to recover quickly from potential compromises.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.601Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694572a4133fda1465b9f67c
Added to database: 12/19/2025, 3:43:32 PM
Last enriched: 12/19/2025, 3:58:04 PM
Last updated: 12/19/2025, 4:54:33 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66580: CWE-94: Improper Control of Generation of Code ('Code Injection') in OpenAgentPlatform Dive
CriticalCVE-2025-65035: CWE-502: Deserialization of Untrusted Data in pluginsGLPI databaseinventory
MediumCVE-2025-14956: Heap-based Buffer Overflow in WebAssembly Binaryen
MediumCVE-2025-14955: Improper Initialization in Open5GS
MediumCVE-2025-14812: CWE-1021 Improper Restriction of Rendered UI Layers or Frames in The Browser Company of New York ArcSearch
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.