CVE-2026-41064: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in WWBN AVideo
CVE-2026-41064 is a critical OS command injection vulnerability in WWBN AVideo versions up to and including 29. 0. The vulnerability stems from an incomplete fix in the test. php script where the use of escapeshellarg was applied only to the wget code path, leaving file_get_contents and curl code paths unsanitized. Additionally, the URL validation regex is insufficient, allowing malformed URLs such as those starting with 'httpevil' to bypass checks. A commit (78bccae74634ead68aa6528d631c9ec4fd7aa536) contains an updated fix addressing this issue. There is no official patch or vendor advisory provided in the data, and no known exploits in the wild have been reported.
AI Analysis
Technical Summary
WWBN AVideo, an open source video platform, suffers from an OS command injection vulnerability (CWE-78) in its test.php script in versions up to 29.0. The initial fix applied escapeshellarg only to the wget command, but left other code paths such as file_get_contents and curl unsanitized. The URL validation uses a regex /^http/ which incorrectly accepts strings like 'httpevil.com', allowing potentially malicious input to reach OS commands. This flaw can lead to command injection with high confidentiality impact and limited integrity impact, as reflected by a CVSS 3.1 score of 9.3. An updated fix is referenced by a specific commit, but no official patch or advisory is documented in the provided data.
Potential Impact
Successful exploitation of this vulnerability could allow an unauthenticated attacker to execute arbitrary OS commands on the server hosting AVideo, potentially leading to full confidentiality compromise of the system. The CVSS score of 9.3 indicates critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and scope change. Integrity impact is limited, and availability is not affected. No known exploits in the wild have been reported as of the published date.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. The provided data references a commit that contains an updated fix, suggesting a patch exists in the source repository. Until an official patch is released and applied, users should avoid using affected versions (<= 29.0) and monitor the vendor's repository or advisory channels for the official fix. No vendor advisory or official remediation level is provided in the data.
CVE-2026-41064: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in WWBN AVideo
Description
CVE-2026-41064 is a critical OS command injection vulnerability in WWBN AVideo versions up to and including 29. 0. The vulnerability stems from an incomplete fix in the test. php script where the use of escapeshellarg was applied only to the wget code path, leaving file_get_contents and curl code paths unsanitized. Additionally, the URL validation regex is insufficient, allowing malformed URLs such as those starting with 'httpevil' to bypass checks. A commit (78bccae74634ead68aa6528d631c9ec4fd7aa536) contains an updated fix addressing this issue. There is no official patch or vendor advisory provided in the data, and no known exploits in the wild have been reported.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
WWBN AVideo, an open source video platform, suffers from an OS command injection vulnerability (CWE-78) in its test.php script in versions up to 29.0. The initial fix applied escapeshellarg only to the wget command, but left other code paths such as file_get_contents and curl unsanitized. The URL validation uses a regex /^http/ which incorrectly accepts strings like 'httpevil.com', allowing potentially malicious input to reach OS commands. This flaw can lead to command injection with high confidentiality impact and limited integrity impact, as reflected by a CVSS 3.1 score of 9.3. An updated fix is referenced by a specific commit, but no official patch or advisory is documented in the provided data.
Potential Impact
Successful exploitation of this vulnerability could allow an unauthenticated attacker to execute arbitrary OS commands on the server hosting AVideo, potentially leading to full confidentiality compromise of the system. The CVSS score of 9.3 indicates critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and scope change. Integrity impact is limited, and availability is not affected. No known exploits in the wild have been reported as of the published date.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. The provided data references a commit that contains an updated fix, suggesting a patch exists in the source repository. Until an official patch is released and applied, users should avoid using affected versions (<= 29.0) and monitor the vendor's repository or advisory channels for the official fix. No vendor advisory or official remediation level is provided in the data.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-04-16T16:43:03.173Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69e808b919fe3cd2cd05c6ab
Added to database: 4/21/2026, 11:31:05 PM
Last enriched: 4/21/2026, 11:46:19 PM
Last updated: 4/22/2026, 12:37:54 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.