Description
AVideo versions 14.3.1 prior to 20.1 contain an unauthenticated remote code execution vulnerability caused by predictable generation of an installation salt using PHP uniqid(). The installation timestamp is exposed via a public endpoint, and a derived hash identifier is accessible through unauthenticated API responses, allowing attackers to brute-force the remaining entropy. The recovered salt can then be used to encrypt a malicious payload supplied to a notification API endpoint that evaluates attacker-controlled input, resulting in arbitrary code execution as the web server user.
Problem types
CWE-94 Improper Control of Generation of Code ('Code Injection')
Product status
14.3.1 (semver) before 20.1
Credits
Valentin Lobstein (Chocapikk)
References
github.com/WWBN/AVideo/commit/4a53ab2
github.com/WWBN/AVideo/commit/a2bdbff
www.vulncheck.com/...d-rce-via-predictable-installation-salt
chocapikk.com/posts/2025/avideo-security-vulnerabilities/
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.