Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34435: CWE-639 Authorization Bypass Through User-Controlled Key in World Wide Broadcast Network AVideo

0
High
VulnerabilityCVE-2025-34435cvecve-2025-34435cwe-639
Published: Wed Dec 17 2025 (12/17/2025, 19:50:30 UTC)
Source: CVE Database V5
Vendor/Project: World Wide Broadcast Network
Product: AVideo

Description

AVideo versions prior to 20.1 are vulnerable to an insecure direct object reference (IDOR) that allows any authenticated user to delete media files belonging to other users. The affected endpoint validates authentication but fails to verify ownership or edit permissions for the targeted video.

AI-Powered Analysis

AILast updated: 12/24/2025, 20:18:49 UTC

Technical Analysis

CVE-2025-34435 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the AVideo platform by World Wide Broadcast Network. The flaw exists in versions prior to 20.1, where the media deletion API endpoint validates only that the user is authenticated but does not verify whether the user owns the media or has permissions to delete it. This insecure direct object reference (IDOR) allows any authenticated user to delete media files belonging to other users, leading to unauthorized data deletion. The vulnerability does not require elevated privileges beyond authentication and does not require user interaction, making it straightforward to exploit. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no attack prerequisites (AT:N), privileges required are low (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). The vulnerability was reserved in April 2025 and published in December 2025. No known exploits are currently in the wild, but the high severity and ease of exploitation make it a critical risk for organizations using affected versions. The lack of patch links suggests that remediation relies on upgrading to version 20.1 or later where the authorization checks are presumably fixed.

Potential Impact

For European organizations, the impact of this vulnerability can be severe, particularly for those using AVideo as a media management or broadcasting platform. Unauthorized deletion of media files can lead to loss of critical content, disruption of business operations, reputational damage, and potential regulatory compliance issues related to data integrity and availability. Media companies, educational institutions, and enterprises relying on AVideo for internal or external video content distribution are at risk. The vulnerability could be exploited by malicious insiders or external attackers who have obtained valid user credentials, enabling them to disrupt services or sabotage content without needing elevated privileges. This could also impact collaborative environments where multiple users share media resources, leading to trust and operational challenges. Given the high CVSS score and the nature of the vulnerability, the risk to confidentiality, integrity, and availability is substantial.

Mitigation Recommendations

To mitigate CVE-2025-34435, organizations should immediately upgrade AVideo installations to version 20.1 or later, where the authorization bypass vulnerability has been addressed. Until upgrades can be applied, restrict access to the media deletion endpoints by implementing additional access controls such as network segmentation, IP whitelisting, or application-layer firewalls. Conduct a thorough audit of user permissions and monitor logs for unusual deletion activity to detect potential exploitation attempts. Implement multi-factor authentication (MFA) to reduce the risk of compromised credentials being used to exploit this vulnerability. Additionally, review and harden the authorization logic in custom deployments or integrations to ensure ownership and edit permissions are strictly verified before allowing media deletion. Regularly back up media content to enable recovery in case of unauthorized deletions. Finally, educate users about the risks of credential sharing and phishing attacks that could lead to unauthorized access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.601Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69430b71c9138a40d2e72f37

Added to database: 12/17/2025, 7:58:41 PM

Last enriched: 12/24/2025, 8:18:49 PM

Last updated: 2/4/2026, 1:53:14 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats