CVE-2025-34441: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in World Wide Broadcast Network AVideo
AVideo versions prior to 20.0 expose sensitive user information through an unauthenticated public API endpoint. Responses include emails, usernames, administrative status, and last login times, enabling user enumeration and privacy violations.
AI Analysis
Technical Summary
CVE-2025-34441 is a vulnerability identified in the World Wide Broadcast Network's AVideo platform, affecting all versions prior to 20.0. The issue arises from an unauthenticated public API endpoint that returns sensitive user information including email addresses, usernames, administrative privileges, and last login timestamps. This exposure constitutes a CWE-359 weakness, where private personal information is accessible to unauthorized actors. The vulnerability allows attackers to enumerate users and gather data that can be leveraged for further attacks such as targeted phishing, social engineering, or privilege escalation attempts. The flaw does not require any authentication or user interaction, making exploitation straightforward. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low to low integrity and availability impacts (VC:L, VI:L, VA:L). No known exploits have been reported in the wild as of the publication date, but the exposure of administrative status information increases the risk profile. The vulnerability affects confidentiality primarily, with some impact on integrity and availability due to potential misuse of the exposed data. The lack of patch links suggests that remediation involves upgrading to version 20.0 or later, which presumably addresses the issue by securing the API endpoint. Organizations relying on AVideo for media streaming or broadcasting services should prioritize mitigation to prevent unauthorized data disclosure.
Potential Impact
For European organizations, this vulnerability poses a significant privacy risk by exposing personally identifiable information (PII) such as emails and usernames, which are protected under GDPR regulations. Unauthorized access to administrative status information can facilitate privilege escalation or targeted attacks against high-value accounts. The exposure of last login times can aid attackers in crafting timing-based social engineering attacks. Media companies, educational institutions, and broadcasters using AVideo are particularly vulnerable to reputational damage and regulatory penalties if user data is leaked. The ease of exploitation without authentication increases the likelihood of reconnaissance activities by malicious actors. While the vulnerability does not directly compromise system availability or integrity, the indirect effects of user enumeration and privacy violations can lead to broader security incidents. European organizations must consider the legal and compliance implications alongside the technical risks.
Mitigation Recommendations
To mitigate CVE-2025-34441, organizations should immediately upgrade AVideo installations to version 20.0 or later, where the vulnerability is addressed. If upgrading is not immediately feasible, restrict access to the vulnerable API endpoint by implementing network-level controls such as IP whitelisting or VPN access. Conduct thorough audits of API endpoints to identify and secure any other unauthenticated data exposures. Implement robust logging and monitoring to detect unusual access patterns indicative of enumeration attempts. Educate users and administrators about phishing risks that may arise from leaked information. Additionally, review and enforce strict access control policies within AVideo to minimize the impact of any data exposure. Engage with the vendor for official patches or workarounds and stay updated on any emerging exploits or advisories.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-34441: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in World Wide Broadcast Network AVideo
Description
AVideo versions prior to 20.0 expose sensitive user information through an unauthenticated public API endpoint. Responses include emails, usernames, administrative status, and last login times, enabling user enumeration and privacy violations.
AI-Powered Analysis
Technical Analysis
CVE-2025-34441 is a vulnerability identified in the World Wide Broadcast Network's AVideo platform, affecting all versions prior to 20.0. The issue arises from an unauthenticated public API endpoint that returns sensitive user information including email addresses, usernames, administrative privileges, and last login timestamps. This exposure constitutes a CWE-359 weakness, where private personal information is accessible to unauthorized actors. The vulnerability allows attackers to enumerate users and gather data that can be leveraged for further attacks such as targeted phishing, social engineering, or privilege escalation attempts. The flaw does not require any authentication or user interaction, making exploitation straightforward. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low to low integrity and availability impacts (VC:L, VI:L, VA:L). No known exploits have been reported in the wild as of the publication date, but the exposure of administrative status information increases the risk profile. The vulnerability affects confidentiality primarily, with some impact on integrity and availability due to potential misuse of the exposed data. The lack of patch links suggests that remediation involves upgrading to version 20.0 or later, which presumably addresses the issue by securing the API endpoint. Organizations relying on AVideo for media streaming or broadcasting services should prioritize mitigation to prevent unauthorized data disclosure.
Potential Impact
For European organizations, this vulnerability poses a significant privacy risk by exposing personally identifiable information (PII) such as emails and usernames, which are protected under GDPR regulations. Unauthorized access to administrative status information can facilitate privilege escalation or targeted attacks against high-value accounts. The exposure of last login times can aid attackers in crafting timing-based social engineering attacks. Media companies, educational institutions, and broadcasters using AVideo are particularly vulnerable to reputational damage and regulatory penalties if user data is leaked. The ease of exploitation without authentication increases the likelihood of reconnaissance activities by malicious actors. While the vulnerability does not directly compromise system availability or integrity, the indirect effects of user enumeration and privacy violations can lead to broader security incidents. European organizations must consider the legal and compliance implications alongside the technical risks.
Mitigation Recommendations
To mitigate CVE-2025-34441, organizations should immediately upgrade AVideo installations to version 20.0 or later, where the vulnerability is addressed. If upgrading is not immediately feasible, restrict access to the vulnerable API endpoint by implementing network-level controls such as IP whitelisting or VPN access. Conduct thorough audits of API endpoints to identify and secure any other unauthenticated data exposures. Implement robust logging and monitoring to detect unusual access patterns indicative of enumeration attempts. Educate users and administrators about phishing risks that may arise from leaked information. Additionally, review and enforce strict access control policies within AVideo to minimize the impact of any data exposure. Engage with the vendor for official patches or workarounds and stay updated on any emerging exploits or advisories.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.602Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694309ba0b6f32e62bf653d5
Added to database: 12/17/2025, 7:51:22 PM
Last enriched: 12/17/2025, 7:59:27 PM
Last updated: 12/18/2025, 3:32:12 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14856: Code Injection in y_project RuoYi
MediumCVE-2025-14841: NULL Pointer Dereference in OFFIS DCMTK
MediumCVE-2025-14837: Code Injection in ZZCMS
MediumKimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
MediumCVE-2025-14836: Cleartext Storage in a File or on Disk in ZZCMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.