Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. wwbn/avideo
  4. ›
  5. CVE-2026-40909

CVE-2026-40909: WWBN AVideo has a Path Traversal in Locale Save Endpoint Enables Arbitrary PHP File Write to Any Web-Accessible Directory (RCE)

April 14, 2026 (updated April 24, 2026)

The locale save endpoint (locale/save.php) constructs a file path by directly concatenating $_POST['flag'] into the path at line 30 without any sanitization. The $_POST['code'] parameter is then written verbatim to that path via fwrite() at line 40. An admin attacker (or any user who can CSRF an admin, since no CSRF token is checked and cookies use SameSite=None) can traverse out of the locale/ directory and write arbitrary .php files to any writable location on the filesystem, achieving Remote Code Execution.

References

  • github.com/WWBN/AVideo
  • github.com/WWBN/AVideo/commit/57f89ffbc27d37c9d9dd727212334846e78ac21a
  • github.com/WWBN/AVideo/security/advisories/GHSA-6rc6-p838-686f
  • github.com/advisories/GHSA-6rc6-p838-686f
  • nvd.nist.gov/vuln/detail/CVE-2026-40909

Code Behaviors & Features

Detect and mitigate CVE-2026-40909 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 29.0

Solution

Unfortunately, there is no solution available yet.

Impact 8.7 HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Source file

packagist/wwbn/avideo/CVE-2026-40909.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:15 +0000.