Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24140: CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes in franklioxygen MyTube

0
Low
VulnerabilityCVE-2026-24140cvecve-2026-24140cwe-915
Published: Fri Jan 23 2026 (01/23/2026, 23:59:56 UTC)
Source: CVE Database V5
Vendor/Project: franklioxygen
Product: MyTube

Description

MyTube is a self-hosted downloader and player for several video websites. Versions 1.7.78 and below have a Mass Assignment vulnerability in the settings management functionality due to insufficient input validation. The application's saveSettings() function accepts arbitrary key-value pairs without validating property names against allowed settings. The function uses Record<string, any> as input type and iterates over all entries using Object.entries() without filtering unauthorized properties. Any field sent by the attacker is directly persisted to the database, regardless of whether it corresponds to a legitimate application setting. This issue has been fixed in version 1.7.78.

AI-Powered Analysis

AILast updated: 01/31/2026, 08:52:52 UTC

Technical Analysis

CVE-2026-24140 identifies a mass assignment vulnerability in the MyTube application, a self-hosted video downloader and player supporting multiple video websites. Versions 1.7.78 and earlier contain a flaw in the settings management functionality, specifically in the saveSettings() function. This function accepts a Record<string, any> input type representing arbitrary key-value pairs for configuration settings. However, it lacks proper validation to restrict which properties can be modified. The function iterates over all entries using Object.entries() and directly persists every property to the database without filtering or verifying if the property corresponds to a legitimate setting. This improper control over dynamically-determined object attributes (CWE-915) allows an attacker with high privileges to inject unauthorized settings or modify internal application state, potentially leading to integrity violations such as misconfiguration or enabling hidden features. The vulnerability does not affect confidentiality or availability and requires the attacker to have authenticated high-level access to the application. No user interaction is needed. The issue was publicly disclosed on January 23, 2026, and fixed in version 1.7.79. There are no known exploits in the wild, and the CVSS v3.1 base score is 2.7, reflecting low severity due to limited impact and exploitation requirements.

Potential Impact

For European organizations using MyTube for self-hosted video downloading and playback, this vulnerability could allow an attacker with high privileges to alter application settings beyond intended parameters. This may lead to unauthorized configuration changes, potentially undermining application integrity and trustworthiness of media content delivery. While confidentiality and availability are not directly impacted, integrity violations could disrupt workflows or introduce subtle misconfigurations that degrade service quality or security posture. Organizations in media, broadcasting, or content distribution sectors relying on MyTube may face operational risks if attackers exploit this flaw to manipulate settings. However, the requirement for high privilege and absence of known exploits limit the immediate threat. Still, failure to patch could expose sensitive environments to targeted attacks or insider threats aiming to subvert application behavior.

Mitigation Recommendations

European organizations should immediately upgrade MyTube to version 1.7.79 or later, where the vulnerability is fixed by enforcing strict validation of allowed settings properties in the saveSettings() function. Until upgrading, administrators should restrict access to the settings management interface to trusted personnel only, minimizing the risk of high-privilege attackers exploiting the flaw. Implement application-layer input validation to whitelist acceptable configuration keys and reject any unexpected parameters. Conduct thorough audits of existing settings to detect unauthorized modifications. Employ monitoring and alerting on configuration changes to quickly identify suspicious activity. Additionally, enforce strong authentication and access controls to prevent unauthorized high-privilege access. Regularly review and update software dependencies and maintain a patch management process to promptly address future vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-21T18:38:22.475Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69740ce44623b1157c6b18a3

Added to database: 1/24/2026, 12:05:56 AM

Last enriched: 1/31/2026, 8:52:52 AM

Last updated: 2/8/2026, 5:23:50 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats