Description
AVideo versions prior to 20.1 are vulnerable to an insecure direct object reference (IDOR) that allows any authenticated user to delete media files belonging to other users. The affected endpoint validates authentication but fails to verify ownership or edit permissions for the targeted video.
References (4)
Core 4
Core References
Patch patch
https://github.com/WWBN/AVideo/commit/275a54268b
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/avideo-idor-arbitrary-file-deletion
Various Sources technical-description
exploit
https://chocapikk.com/posts/2025/avideo-security-vulnerabilities/
Scores
CVSS v3
6.5
EPSS
0.0008
EPSS Percentile
24.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-639
Status
published
Products (1)
wwbn/avideo
< 20.0
Published
Dec 17, 2025
Tracked Since
Feb 18, 2026