CVE-2026-39369

HIGH

WWBN AVideo's GIF poster fetch bypasses traversal scrubbing and exposes local files through public media URLs

Title source: cna

Description

WWBN AVideo is an open source video platform. In versions 26.0 and prior, objects/aVideoEncoderReceiveImage.json.php allowed an authenticated uploader to fetch attacker-controlled same-origin /videos/... URLs, bypass traversal scrubbing, and expose server-local files through the GIF poster storage path. The vulnerable GIF branch could be abused to read local files such as /etc/passwd or application source files and republish those bytes through a normal public GIF media URL.

Scores

CVSS v3 7.6
EPSS 0.0002
EPSS Percentile 5.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L

Details

CWE
CWE-22
Status published
Products (3)
wwbn/avideo < 26.0
WWBN/AVideo 0Packagist
WWBN/AVideo <= 26.0
Published Apr 07, 2026
Tracked Since Apr 08, 2026