Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34442: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in World Wide Broadcast Network AVideo

0
Medium
VulnerabilityCVE-2025-34442cvecve-2025-34442cwe-497
Published: Wed Dec 17 2025 (12/17/2025, 19:48:39 UTC)
Source: CVE Database V5
Vendor/Project: World Wide Broadcast Network
Product: AVideo

Description

AVideo versions prior to 20.0 disclose absolute filesystem paths via multiple public API endpoints. Returned metadata includes full server paths to media files, revealing underlying filesystem structure and facilitating more effective attack chains.

AI-Powered Analysis

AILast updated: 12/17/2025, 19:59:13 UTC

Technical Analysis

CVE-2025-34442 is a vulnerability identified in the World Wide Broadcast Network's AVideo product, affecting all versions prior to 20.0. The flaw involves the exposure of absolute filesystem paths through multiple public API endpoints. When clients query these APIs, the returned metadata includes full server paths to media files, thereby revealing the underlying directory structure of the server hosting AVideo. This type of information disclosure is classified under CWE-497, which concerns the exposure of sensitive system information to unauthorized entities. The vulnerability is remotely exploitable without authentication or user interaction, making it accessible to any attacker who can reach the API endpoints. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low to medium impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no active exploits have been reported, the disclosure of absolute paths can facilitate attackers in mapping the server environment, identifying potential targets for further attacks such as path traversal, local file inclusion, or privilege escalation. The absence of patch links suggests that remediation requires upgrading to version 20.0 or later, which presumably addresses this issue by sanitizing API responses and removing sensitive path information. Organizations relying on AVideo for media streaming or broadcasting should be aware of this vulnerability due to the potential for attackers to gain insights into server configurations and file locations, which could be leveraged in multi-stage attack chains.

Potential Impact

For European organizations, the exposure of absolute filesystem paths can significantly increase the risk profile of their AVideo deployments. Attackers gaining knowledge of the server's directory structure can craft more precise and effective attacks, such as exploiting path traversal vulnerabilities or targeting specific files for unauthorized access. This can lead to unauthorized data disclosure, service disruption, or even full system compromise if combined with other vulnerabilities. Media companies, broadcasters, educational institutions, and any entities using AVideo to deliver video content are particularly at risk. The impact extends to reputational damage, regulatory non-compliance (especially under GDPR if personal data is involved), and potential financial losses due to service downtime or breach remediation costs. Since the vulnerability requires no authentication and is exploitable remotely, the attack surface is broad, especially for publicly accessible AVideo instances. The medium severity rating reflects the moderate but non-trivial risk posed by this information disclosure, which can be a stepping stone for more severe attacks.

Mitigation Recommendations

1. Upgrade AVideo installations to version 20.0 or later, where this vulnerability is addressed. 2. Restrict access to public API endpoints by implementing network-level controls such as IP whitelisting or VPN access to reduce exposure. 3. Implement web application firewalls (WAFs) to detect and block suspicious API requests that attempt to enumerate or exploit filesystem information. 4. Review and sanitize API responses to ensure that no absolute filesystem paths or sensitive metadata are leaked. 5. Conduct regular security audits and penetration tests focusing on API endpoints to identify and remediate similar information disclosure issues. 6. Monitor logs for unusual access patterns or repeated requests to API endpoints that could indicate reconnaissance activity. 7. Educate development and operations teams about secure coding practices to avoid exposing sensitive system information in responses. 8. If upgrading immediately is not feasible, consider temporary mitigations such as disabling or limiting the affected API endpoints until a patch is applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.602Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694309ba0b6f32e62bf653da

Added to database: 12/17/2025, 7:51:22 PM

Last enriched: 12/17/2025, 7:59:13 PM

Last updated: 12/18/2025, 6:15:02 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats