AVideo is a video-sharing Platform software. Prior to version 7.0, an unauthenticated attacker can execute arbitrary OS commands on the server by injecting shell command substitution into the base64Url GET parameter. This can lead to full server compromise, data exfiltration (e.g., configuration secrets, internal keys, credentials), and service disruption. This issue has been patched in version 7.0.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9j26-99jh-v26q | WWBN AVideo is vulnerable to unauthenticated OS Command Injection via base64Url in objects/getImage.php |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wwbn
Wwbn avideo-encoder |
|
| Vendors & Products |
Wwbn
Wwbn avideo-encoder |
Fri, 06 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AVideo is a video-sharing Platform software. Prior to version 7.0, an unauthenticated attacker can execute arbitrary OS commands on the server by injecting shell command substitution into the base64Url GET parameter. This can lead to full server compromise, data exfiltration (e.g., configuration secrets, internal keys, credentials), and service disruption. This issue has been patched in version 7.0. | |
| Title | AVideo: Unauthenticated OS Command Injection via base64Url in objects/getImage.php | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-06T07:08:26.844Z
Reserved: 2026-03-03T17:50:11.244Z
Link: CVE-2026-29058
No data.
Status : Received
Published: 2026-03-06T07:16:02.267
Modified: 2026-03-06T07:16:02.267
Link: CVE-2026-29058
No data.
OpenCVE Enrichment
Updated: 2026-03-06T14:55:29Z
Weaknesses
Github GHSA