Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. wwbn/avideo
  4. ›
  5. GHSA-wxjx-r2j2-96fx

GHSA-wxjx-r2j2-96fx: AVideo: Full-Read SSRF Through Unvalidated statsURL Parameter in plugin/Live/test.php

March 25, 2026

The plugin/Live/test.php endpoint accepts a URL via the statsURL parameter and fetches it server-side using file_get_contents(), curl_exec(), or wget, returning the full response content in the HTML output. The only validation is a trivial regex (/^http/) that does not block requests to internal/private IP ranges or cloud metadata endpoints. The codebase provides isSSRFSafeURL() which blocks private IPs and resolves DNS to prevent rebinding, but this endpoint does not call it. An authenticated admin can read responses from cloud metadata services, internal network services, and localhost endpoints.

References

  • github.com/WWBN/AVideo
  • github.com/WWBN/AVideo/commit/c95eafbdfccd5959c546a430c32fb3b6026f39ac
  • github.com/WWBN/AVideo/security/advisories/GHSA-wxjx-r2j2-96fx
  • github.com/advisories/GHSA-wxjx-r2j2-96fx

Code Behaviors & Features

Detect and mitigate GHSA-wxjx-r2j2-96fx with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 26.0

Solution

Unfortunately, there is no solution available yet.

Impact 4.9 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-918: Server-Side Request Forgery (SSRF)

Source file

packagist/wwbn/avideo/GHSA-wxjx-r2j2-96fx.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:34 +0000.