Home

Description

MyTube is a self-hosted downloader and player for several video websites. Versions 1.7.78 and below have a Mass Assignment vulnerability in the settings management functionality due to insufficient input validation. The application's saveSettings() function accepts arbitrary key-value pairs without validating property names against allowed settings. The function uses Record<string, any> as input type and iterates over all entries using Object.entries() without filtering unauthorized properties. Any field sent by the attacker is directly persisted to the database, regardless of whether it corresponds to a legitimate application setting. This issue has been fixed in version 1.7.78.

PUBLISHED Reserved 2026-01-21 | Published 2026-01-23 | Updated 2026-01-26 | Assigner GitHub_M




LOW: 2.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes

Product status

< 1.7.79
affected

References

github.com/...MyTube/security/advisories/GHSA-c938-x24g-fxcx

github.com/...ommit/9d737cb373f7af3e5c92d458e2832caf817b6de6

cve.org (CVE-2026-24140)

nvd.nist.gov (CVE-2026-24140)

Download JSON