Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34436: CWE-639 Authorization Bypass Through User-Controlled Key in World Wide Broadcast Network AVideo

0
High
VulnerabilityCVE-2025-34436cvecve-2025-34436cwe-639
Published: Wed Dec 17 2025 (12/17/2025, 19:50:12 UTC)
Source: CVE Database V5
Vendor/Project: World Wide Broadcast Network
Product: AVideo

Description

AVideo versions prior to 20.1 allow any authenticated user to upload files into directories belonging to other users due to an insecure direct object reference. The upload functionality verifies authentication but does not enforce ownership checks.

AI-Powered Analysis

AILast updated: 12/24/2025, 20:20:11 UTC

Technical Analysis

CVE-2025-34436 is an authorization bypass vulnerability categorized under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the AVideo platform by World Wide Broadcast Network. The vulnerability exists in versions prior to 20.1, where the upload functionality allows authenticated users to upload files into directories belonging to other users. This occurs because while the system verifies that the user is authenticated, it does not enforce ownership checks on the target upload directory, leading to an insecure direct object reference (IDOR). An attacker with valid credentials but limited privileges can exploit this flaw to place arbitrary files into other users' directories, potentially leading to unauthorized data modification, data leakage, or even execution of malicious content if the platform processes uploaded files insecurely. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no requirement for user interaction. Although no known exploits are currently reported in the wild, the flaw presents a significant risk in multi-user environments where user data isolation is critical. The lack of patch links indicates that a fix may not yet be publicly available, underscoring the need for immediate mitigation steps. The vulnerability is particularly relevant for organizations relying on AVideo for content management and streaming, as unauthorized file uploads could disrupt service or compromise user data.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to data confidentiality, integrity, and availability within AVideo deployments. Unauthorized file uploads into other users' directories can lead to data leakage, unauthorized content modification, or injection of malicious files that could be executed or served to other users. This can result in reputational damage, regulatory non-compliance (especially under GDPR), and potential service disruption. Organizations using AVideo in multi-tenant or shared hosting environments are particularly vulnerable, as attackers can escalate privileges or interfere with other users' data. The ease of exploitation—requiring only authenticated access with low privileges and no user interaction—amplifies the threat. Given the widespread use of video platforms for corporate communications, training, and customer engagement, exploitation could also facilitate phishing or social engineering attacks leveraging compromised content. The absence of known exploits currently provides a window for proactive defense but also means organizations should act swiftly to prevent future attacks.

Mitigation Recommendations

1. Immediately restrict upload permissions to enforce strict ownership validation, ensuring users can only upload files to their own directories. 2. Implement server-side checks that verify the ownership of the target directory before accepting uploads, preventing insecure direct object references. 3. Monitor upload activity logs for anomalies such as uploads to unexpected directories or by unusual user accounts. 4. Apply any available patches or updates from the vendor as soon as they are released. 5. If patches are not yet available, consider temporarily disabling file upload functionality or restricting it to trusted users only. 6. Employ file integrity monitoring to detect unauthorized changes in user directories. 7. Conduct regular security audits and penetration testing focusing on access control mechanisms within AVideo. 8. Educate users about the risks of unauthorized file uploads and encourage reporting of suspicious activity. 9. Use web application firewalls (WAFs) to detect and block suspicious upload requests targeting other users’ directories. 10. Review and harden overall access control policies within the platform to prevent similar authorization bypass issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.601Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69430b71c9138a40d2e72f3c

Added to database: 12/17/2025, 7:58:41 PM

Last enriched: 12/24/2025, 8:20:11 PM

Last updated: 2/7/2026, 10:44:47 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats