Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34435: CWE-639 Authorization Bypass Through User-Controlled Key in World Wide Broadcast Network AVideo

0
High
VulnerabilityCVE-2025-34435cvecve-2025-34435cwe-639
Published: Wed Dec 17 2025 (12/17/2025, 19:50:30 UTC)
Source: CVE Database V5
Vendor/Project: World Wide Broadcast Network
Product: AVideo

Description

AVideo versions prior to 20.0 are vulnerable to an insecure direct object reference (IDOR) that allows any authenticated user to delete media files belonging to other users. The affected endpoint validates authentication but fails to verify ownership or edit permissions for the targeted video.

AI-Powered Analysis

AILast updated: 12/17/2025, 20:06:07 UTC

Technical Analysis

CVE-2025-34435 is an authorization bypass vulnerability categorized under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the AVideo platform developed by World Wide Broadcast Network. The flaw exists in versions prior to 20.0 and manifests as an insecure direct object reference (IDOR) in the media deletion functionality. Specifically, while the endpoint correctly verifies that the user is authenticated, it fails to validate whether the authenticated user owns the media file or has the necessary permissions to delete it. This allows any authenticated user, regardless of their privileges, to delete videos belonging to other users. The vulnerability does not require elevated privileges beyond authentication, nor does it require user interaction, making it straightforward to exploit. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, as unauthorized deletion compromises data integrity and availability of media assets. The vulnerability does not involve scope changes or require complex attack vectors, increasing its risk profile. No public exploits have been reported yet, but the potential for misuse in multi-user environments is significant. The lack of patch links suggests that a fix may be pending or integrated in version 20.0. Organizations relying on AVideo for video hosting or streaming services should prioritize remediation to prevent unauthorized content deletion and potential operational disruption.

Potential Impact

For European organizations, the impact of CVE-2025-34435 can be substantial, particularly for enterprises, educational institutions, media companies, and any entities using AVideo for collaborative video management. Unauthorized deletion of media files can lead to loss of critical business content, disruption of services, damage to reputation, and potential regulatory compliance issues related to data integrity and availability. The vulnerability undermines trust in the platform’s access controls, potentially enabling insider threats or malicious users to sabotage content. In sectors such as media production, e-learning, or corporate communications, where video content is integral, this could result in operational downtime and financial losses. Additionally, organizations subject to GDPR must consider the implications of data loss and ensure appropriate incident response and notification procedures. The ease of exploitation and lack of required user interaction increase the likelihood of exploitation if attackers gain authenticated access, emphasizing the need for prompt mitigation.

Mitigation Recommendations

To mitigate CVE-2025-34435, European organizations should: 1) Upgrade AVideo installations to version 20.0 or later as soon as the patch is available, ensuring the vulnerability is addressed. 2) Until patching, restrict access to the media deletion functionality to only trusted users and minimize the number of authenticated users with deletion privileges. 3) Implement additional authorization checks at the application or web server level, such as web application firewalls (WAFs) with custom rules to detect and block unauthorized deletion attempts. 4) Conduct thorough audits of user permissions and access logs to detect any anomalous deletion activities. 5) Employ multi-factor authentication (MFA) to reduce the risk of compromised credentials being used to exploit the vulnerability. 6) Educate users about the risks of sharing credentials and monitor for suspicious authentication patterns. 7) Consider isolating critical media content in separate environments or storage with stricter access controls. 8) Develop and test incident response plans specifically addressing unauthorized data deletion scenarios to minimize operational impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.601Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69430b71c9138a40d2e72f37

Added to database: 12/17/2025, 7:58:41 PM

Last enriched: 12/17/2025, 8:06:07 PM

Last updated: 12/18/2025, 7:21:36 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats