Home

Description

yt-grabber-tui is a terminal user interface application for downloading videos. In versions before 1.0-rc, the application allows users to configure the path to the yt-dlp executable via the path_to_yt_dlp configuration setting. An attacker with write access to the configuration file or the filesystem location of the configured executable can replace the executable with malicious code or create a symlink to an arbitrary executable. When the application invokes yt-dlp, the malicious code is executed with the privileges of the user running yt-grabber-tui. This vulnerability has been patched in version 1.0-rc.

PUBLISHED Reserved 2025-10-10 | Published 2025-10-13 | Updated 2025-10-14 | Assigner GitHub_M




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-59: Improper Link Resolution Before File Access ('Link Following')

Product status

< 1.0-rc
affected

References

github.com/...er-TUI/security/advisories/GHSA-94c4-wh57-8p9c

github.com/...ommit/7adfdb68e8bf24559d1e9d8d4668de3d82c45591

cve.org (CVE-2025-62363)

nvd.nist.gov (CVE-2025-62363)

Download JSON