Home

Description

WWBN AVideo is an open source video platform. In versions 29.0 and prior, the locale save endpoint (`locale/save.php`) constructs a file path by directly concatenating `$_POST['flag']` into the path at line 30 without any sanitization. The `$_POST['code']` parameter is then written verbatim to that path via `fwrite()` at line 40. An admin attacker (or any user who can CSRF an admin, since no CSRF token is checked and cookies use `SameSite=None`) can traverse out of the `locale/` directory and write arbitrary `.php` files to any writable location on the filesystem, achieving Remote Code Execution. Commit 57f89ffbc27d37c9d9dd727212334846e78ac21a fixes the issue.

PUBLISHED Reserved 2026-04-15 | Published 2026-04-21 | Updated 2026-04-21 | Assigner GitHub_M




HIGH: 8.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

<= 29.0
affected

References

github.com/...AVideo/security/advisories/GHSA-6rc6-p838-686f exploit

github.com/...AVideo/security/advisories/GHSA-6rc6-p838-686f

github.com/...ommit/57f89ffbc27d37c9d9dd727212334846e78ac21a

cve.org (CVE-2026-40909)

nvd.nist.gov (CVE-2026-40909)

Download JSON