Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34438: CWE-639 Authorization Bypass Through User-Controlled Key in World Wide Broadcast Network AVideo

0
Medium
VulnerabilityCVE-2025-34438cvecve-2025-34438cwe-639
Published: Wed Dec 17 2025 (12/17/2025, 19:51:06 UTC)
Source: CVE Database V5
Vendor/Project: World Wide Broadcast Network
Product: AVideo

Description

AVideo versions prior to 20.0 contain an insecure direct object reference vulnerability allowing users with upload permissions to modify the rotation metadata of any video. The endpoint verifies upload capability but fails to enforce ownership or management rights for the targeted video.

AI-Powered Analysis

AILast updated: 12/17/2025, 20:06:54 UTC

Technical Analysis

CVE-2025-34438 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting AVideo, a video platform product by World Wide Broadcast Network. The vulnerability exists in versions prior to 20.0. The core issue is that the API endpoint responsible for modifying video rotation metadata only checks if the user has upload permissions but does not verify whether the user owns or manages the specific video resource being modified. This insecure direct object reference (IDOR) flaw allows any authenticated user with upload rights to alter the rotation metadata of any video, not limited to their own uploads. The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges required beyond upload permission, and no user interaction. The impact primarily affects data integrity by allowing unauthorized modification of video metadata, which could lead to misrepresentation or confusion in video presentation. There is no indication of impact on confidentiality or availability. No public exploits have been reported yet, and no patches are currently linked, indicating the need for vendor remediation. The vulnerability was reserved in April 2025 and published in December 2025, suggesting it is a recent discovery. Organizations using AVideo should be aware of this flaw and prepare to apply fixes or implement compensating controls.

Potential Impact

For European organizations, the primary impact of CVE-2025-34438 lies in the integrity of video content metadata. Unauthorized modification of video rotation metadata could disrupt user experience, cause misrepresentation of video content, or undermine trust in video assets used for training, marketing, or compliance purposes. While the vulnerability does not directly expose sensitive data or cause service outages, it can facilitate further misuse or social engineering if attackers manipulate video presentation. Organizations relying on AVideo for internal or external video hosting may face reputational risks if manipulated videos are publicly accessible. Additionally, attackers with upload permissions (e.g., contractors or less trusted users) could exploit this flaw to tamper with videos beyond their scope, potentially violating internal policies or regulatory requirements. The lack of known exploits reduces immediate risk, but the medium severity score and ease of exploitation warrant prompt attention. European entities in sectors such as media, education, and corporate communications using AVideo should prioritize mitigation to maintain content integrity and compliance.

Mitigation Recommendations

1. Monitor vendor communications closely and apply official patches or updates for AVideo as soon as they become available, specifically version 20.0 or later which addresses this vulnerability. 2. Until patches are released, implement strict access control policies to limit upload permissions only to fully trusted users. 3. Introduce additional server-side authorization checks that verify ownership or management rights for any video metadata modification requests, ensuring users cannot alter videos they do not own. 4. Conduct regular audits of video metadata changes to detect unauthorized modifications promptly. 5. Employ network segmentation and monitoring to detect anomalous API calls related to video metadata changes. 6. Educate users with upload permissions about the risks and enforce strong authentication mechanisms to reduce the risk of compromised accounts. 7. Consider implementing application-layer firewalls or API gateways with custom rules to restrict modification requests to authorized users only. 8. Review and harden the overall authorization model in AVideo deployments to prevent similar IDOR vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.601Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69430b71c9138a40d2e72f46

Added to database: 12/17/2025, 7:58:41 PM

Last enriched: 12/17/2025, 8:06:54 PM

Last updated: 12/18/2025, 7:29:58 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats