CVE-2026-24140: CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes in franklioxygen MyTube
MyTube is a self-hosted downloader and player for several video websites. Versions 1.7.78 and below have a Mass Assignment vulnerability in the settings management functionality due to insufficient input validation. The application's saveSettings() function accepts arbitrary key-value pairs without validating property names against allowed settings. The function uses Record<string, any> as input type and iterates over all entries using Object.entries() without filtering unauthorized properties. Any field sent by the attacker is directly persisted to the database, regardless of whether it corresponds to a legitimate application setting. This issue has been fixed in version 1.7.78.
AI Analysis
Technical Summary
CVE-2026-24140 identifies a mass assignment vulnerability in the MyTube application, a self-hosted video downloader and player supporting multiple video websites. Versions 1.7.78 and earlier contain a flaw in the settings management functionality, specifically in the saveSettings() function. This function accepts a Record<string, any> input type representing arbitrary key-value pairs for configuration settings. However, it lacks proper validation to restrict which properties can be modified. The function iterates over all entries using Object.entries() and directly persists every property to the database without filtering or verifying if the property corresponds to a legitimate setting. This improper control over dynamically-determined object attributes (CWE-915) allows an attacker with high privileges to inject unauthorized settings or modify internal application state, potentially leading to integrity violations such as misconfiguration or enabling hidden features. The vulnerability does not affect confidentiality or availability and requires the attacker to have authenticated high-level access to the application. No user interaction is needed. The issue was publicly disclosed on January 23, 2026, and fixed in version 1.7.79. There are no known exploits in the wild, and the CVSS v3.1 base score is 2.7, reflecting low severity due to limited impact and exploitation requirements.
Potential Impact
For European organizations using MyTube for self-hosted video downloading and playback, this vulnerability could allow an attacker with high privileges to alter application settings beyond intended parameters. This may lead to unauthorized configuration changes, potentially undermining application integrity and trustworthiness of media content delivery. While confidentiality and availability are not directly impacted, integrity violations could disrupt workflows or introduce subtle misconfigurations that degrade service quality or security posture. Organizations in media, broadcasting, or content distribution sectors relying on MyTube may face operational risks if attackers exploit this flaw to manipulate settings. However, the requirement for high privilege and absence of known exploits limit the immediate threat. Still, failure to patch could expose sensitive environments to targeted attacks or insider threats aiming to subvert application behavior.
Mitigation Recommendations
European organizations should immediately upgrade MyTube to version 1.7.79 or later, where the vulnerability is fixed by enforcing strict validation of allowed settings properties in the saveSettings() function. Until upgrading, administrators should restrict access to the settings management interface to trusted personnel only, minimizing the risk of high-privilege attackers exploiting the flaw. Implement application-layer input validation to whitelist acceptable configuration keys and reject any unexpected parameters. Conduct thorough audits of existing settings to detect unauthorized modifications. Employ monitoring and alerting on configuration changes to quickly identify suspicious activity. Additionally, enforce strong authentication and access controls to prevent unauthorized high-privilege access. Regularly review and update software dependencies and maintain a patch management process to promptly address future vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2026-24140: CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes in franklioxygen MyTube
Description
MyTube is a self-hosted downloader and player for several video websites. Versions 1.7.78 and below have a Mass Assignment vulnerability in the settings management functionality due to insufficient input validation. The application's saveSettings() function accepts arbitrary key-value pairs without validating property names against allowed settings. The function uses Record<string, any> as input type and iterates over all entries using Object.entries() without filtering unauthorized properties. Any field sent by the attacker is directly persisted to the database, regardless of whether it corresponds to a legitimate application setting. This issue has been fixed in version 1.7.78.
AI-Powered Analysis
Technical Analysis
CVE-2026-24140 identifies a mass assignment vulnerability in the MyTube application, a self-hosted video downloader and player supporting multiple video websites. Versions 1.7.78 and earlier contain a flaw in the settings management functionality, specifically in the saveSettings() function. This function accepts a Record<string, any> input type representing arbitrary key-value pairs for configuration settings. However, it lacks proper validation to restrict which properties can be modified. The function iterates over all entries using Object.entries() and directly persists every property to the database without filtering or verifying if the property corresponds to a legitimate setting. This improper control over dynamically-determined object attributes (CWE-915) allows an attacker with high privileges to inject unauthorized settings or modify internal application state, potentially leading to integrity violations such as misconfiguration or enabling hidden features. The vulnerability does not affect confidentiality or availability and requires the attacker to have authenticated high-level access to the application. No user interaction is needed. The issue was publicly disclosed on January 23, 2026, and fixed in version 1.7.79. There are no known exploits in the wild, and the CVSS v3.1 base score is 2.7, reflecting low severity due to limited impact and exploitation requirements.
Potential Impact
For European organizations using MyTube for self-hosted video downloading and playback, this vulnerability could allow an attacker with high privileges to alter application settings beyond intended parameters. This may lead to unauthorized configuration changes, potentially undermining application integrity and trustworthiness of media content delivery. While confidentiality and availability are not directly impacted, integrity violations could disrupt workflows or introduce subtle misconfigurations that degrade service quality or security posture. Organizations in media, broadcasting, or content distribution sectors relying on MyTube may face operational risks if attackers exploit this flaw to manipulate settings. However, the requirement for high privilege and absence of known exploits limit the immediate threat. Still, failure to patch could expose sensitive environments to targeted attacks or insider threats aiming to subvert application behavior.
Mitigation Recommendations
European organizations should immediately upgrade MyTube to version 1.7.79 or later, where the vulnerability is fixed by enforcing strict validation of allowed settings properties in the saveSettings() function. Until upgrading, administrators should restrict access to the settings management interface to trusted personnel only, minimizing the risk of high-privilege attackers exploiting the flaw. Implement application-layer input validation to whitelist acceptable configuration keys and reject any unexpected parameters. Conduct thorough audits of existing settings to detect unauthorized modifications. Employ monitoring and alerting on configuration changes to quickly identify suspicious activity. Additionally, enforce strong authentication and access controls to prevent unauthorized high-privilege access. Regularly review and update software dependencies and maintain a patch management process to promptly address future vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-21T18:38:22.475Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69740ce44623b1157c6b18a3
Added to database: 1/24/2026, 12:05:56 AM
Last enriched: 1/31/2026, 8:52:52 AM
Last updated: 2/8/2026, 5:23:50 AM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2135: Command Injection in UTT HiPER 810
MediumCVE-2026-2134: SQL Injection in PHPGurukul Hospital Management System
MediumCVE-2026-2133: Unrestricted Upload in code-projects Online Music Site
MediumCVE-2026-2132: SQL Injection in code-projects Online Music Site
MediumCVE-2026-2131: OS Command Injection in XixianLiang HarmonyOS-mcp-server
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.