CVE-2026-43875: AVideo: Password Hash Leak in MobileManager OAuth Redirect URL Enables Account Takeover
plugin/MobileManager/oauth2.php completes an OAuth login by sending an HTTP 302 Location: oauth2Success.php?user=<email>&pass=<HASH> where <HASH> is the victim’s stored password hash (md5(hash("whirlpool", sha1(password)))) read directly from the users table. AVideo’s own login endpoint (objects/login.json.php) accepts an encodedPass=1 flag that bypasses hashing and performs a direct string comparison between the supplied value and the stored hash. Anyone who captures the redirect URL — via server logs, referrer leakage, or browser history — therefore obtains a credential equivalent to the plaintext password and can fully take over the account, including admin accounts.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-43875 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →