Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. wwbn/avideo
  4. ›
  5. CVE-2026-27732

CVE-2026-27732: AVideo has Authenticated Server-Side Request Forgery via downloadURL in aVideoEncoder.json.php

February 25, 2026

The aVideoEncoder.json.php API endpoint accepts a downloadURL parameter and fetches the referenced resource server-side without proper validation or an allow-list. This allows authenticated users to trigger server-side requests to arbitrary URLs (including internal network endpoints).

An authenticated attacker can leverage SSRF to interact with internal services and retrieve sensitive data (e.g., internal APIs, metadata services), potentially leading to further compromise depending on the deployment environment.

References

  • github.com/WWBN/AVideo
  • github.com/WWBN/AVideo/commit/384ef2548093f4cbb1bfac00f1f429fe57fab853
  • github.com/WWBN/AVideo/releases/tag/22.0
  • github.com/WWBN/AVideo/security/advisories/GHSA-h39h-7cvg-q7j6
  • github.com/advisories/GHSA-h39h-7cvg-q7j6
  • nvd.nist.gov/vuln/detail/CVE-2026-27732

Code Behaviors & Features

Detect and mitigate CVE-2026-27732 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 21.0.0

Solution

Unfortunately, there is no solution available yet.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-918: Server-Side Request Forgery (SSRF)

Source file

packagist/wwbn/avideo/CVE-2026-27732.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:17:46 +0000.