Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9j26-99jh-v26q | WWBN AVideo is vulnerable to unauthenticated OS Command Injection via base64Url in objects/getImage.php |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 10 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wwbn:avideo-encoder:*:*:*:*:*:*:*:* |
Mon, 09 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wwbn
Wwbn avideo-encoder |
|
| Vendors & Products |
Wwbn
Wwbn avideo-encoder |
Fri, 06 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AVideo is a video-sharing Platform software. Prior to version 7.0, an unauthenticated attacker can execute arbitrary OS commands on the server by injecting shell command substitution into the base64Url GET parameter. This can lead to full server compromise, data exfiltration (e.g., configuration secrets, internal keys, credentials), and service disruption. This issue has been patched in version 7.0. | |
| Title | AVideo: Unauthenticated OS Command Injection via base64Url in objects/getImage.php | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-09T20:01:00.580Z
Reserved: 2026-03-03T17:50:11.244Z
Link: CVE-2026-29058
Updated: 2026-03-09T20:00:56.305Z
Status : Analyzed
Published: 2026-03-06T07:16:02.267
Modified: 2026-03-10T19:14:24.553
Link: CVE-2026-29058
No data.
OpenCVE Enrichment
Updated: 2026-03-06T14:55:29Z
Github GHSA