Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. wwbn/avideo
  4. ›
  5. GHSA-6rc6-p838-686f

GHSA-6rc6-p838-686f: WWBN AVideo has a Path Traversal in Locale Save Endpoint Enables Arbitrary PHP File Write to Any Web-Accessible Directory (RCE)

April 14, 2026

The locale save endpoint (locale/save.php) constructs a file path by directly concatenating $_POST['flag'] into the path at line 30 without any sanitization. The $_POST['code'] parameter is then written verbatim to that path via fwrite() at line 40. An admin attacker (or any user who can CSRF an admin, since no CSRF token is checked and cookies use SameSite=None) can traverse out of the locale/ directory and write arbitrary .php files to any writable location on the filesystem, achieving Remote Code Execution.

References

  • github.com/WWBN/AVideo
  • github.com/WWBN/AVideo/security/advisories/GHSA-6rc6-p838-686f
  • github.com/advisories/GHSA-6rc6-p838-686f

Code Behaviors & Features

Detect and mitigate GHSA-6rc6-p838-686f with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 29.0

Solution

Unfortunately, there is no solution available yet.

Impact 8.7 HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Source file

packagist/wwbn/avideo/GHSA-6rc6-p838-686f.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:30 +0000.