Cyber Posture

CVE-2026-41304

CriticalPublic PoC

Published: 22 April 2026

Published
22 April 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0058 69.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

WWBN AVideo is an open source video platform. In versions 29.0 and below, the `cloneServer.json.php` endpoint in the CloneSite plugin constructs shell commands using user-controlled input (`url` parameter) without proper sanitization. The input is directly concatenated into a `wget` command…

more

executed via `exec()`, allowing command injection. An attacker can inject arbitrary shell commands by breaking out of the intended URL context using shell metacharacters (e.g., `;`). This leads to Remote Code Execution (RCE) on the server. Commit 473c609fc2defdea8b937b00e86ce88eba1f15bb contains a fix.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of the user-controlled 'url' parameter to block shell metacharacters and prevent command injection in the wget exec() call.

prevent

Mandates timely identification and patching of the specific command injection flaw in cloneServer.json.php as fixed in commit 473c609.

prevent

Enforces least functionality by disabling or restricting the non-essential CloneSite plugin and its vulnerable endpoint to eliminate the attack vector.

Security SummaryAI

CVE-2026-41304 is a command injection vulnerability in the WWBN AVideo open source video platform, affecting versions 29.0 and below. The issue resides in the `cloneServer.json.php` endpoint of the CloneSite plugin, where user-controlled input from the `url` parameter is unsanitized and directly concatenated into a `wget` command executed via PHP's `exec()` function. This allows attackers to inject arbitrary shell commands by escaping the URL context with shell metacharacters such as `;`, resulting in remote code execution (RCE) on the server. The vulnerability is rated with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-77 (Command Injection).

The attack requires no authentication (PR:N) and can be exploited remotely over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N). An unauthenticated attacker simply needs to send a malicious HTTP request to the vulnerable endpoint with a crafted `url` parameter, such as one appending shell commands after a semicolon, causing the server to execute arbitrary code alongside the intended `wget` download. Successful exploitation grants full RCE, enabling attackers to achieve high confidentiality, integrity, and availability impacts, such as data exfiltration, persistence, or server compromise.

Mitigation is available via a patch in commit 473c609fc2defdea8b937b00e86ce88eba1f15bb, which addresses the unsanitized input handling. The GitHub security advisory GHSA-xr6f-h4x7-r6qp provides further details on the issue and remediation steps for AVideo users. Security practitioners should urge administrators to update to a patched version beyond 29.0 and review access to the CloneSite plugin endpoint.

Details

CWE(s)

Affected Products

wwbn
avideo
≤ 29.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Unauthenticated command injection in a public-facing web endpoint enables exploitation of public-facing applications (T1190) and execution of arbitrary Unix shell commands (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References