Home

Description

StreamVault is a video download integration solution. Prior to version 251126, a Remote Code Execution (RCE) vulnerability exists in the stream-vault application (SpiritApplication). The application allows administrators to configure yt-dlp arguments via the /admin/api/saveConfig endpoint without sufficient validation. These arguments are stored globally and subsequently used in YtDlpUtil.java when constructing the command line to execute yt-dlp. This issue has been patched in version 251126.

PUBLISHED Reserved 2025-11-24 | Published 2025-12-26 | Updated 2025-12-29 | Assigner GitHub_M




CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

< 251126
affected

References

github.com/...mVault/security/advisories/GHSA-c747-q388-3v6m

github.com/lemon8866/StreamVault/releases/tag/251226

cve.org (CVE-2025-66203)

nvd.nist.gov (CVE-2025-66203)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.