CVE-2025-66203

StreamVault is a video download integration solution. Prior to version 251126, a Remote Code Execution (RCE) vulnerability exists in the stream-vault application (SpiritApplication). The application allows administrators to configure yt-dlp arguments via the /admin/api/saveConfig endpoint without sufficient validation. These arguments are stored globally and subsequently used in YtDlpUtil.java when constructing the command line to execute yt-dlp. This issue has been patched in version 251126.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lemon8866:streamvault:*:*:*:*:*:*:*:*

History

09 Mar 2026, 13:41

Type Values Removed Values Added
First Time Lemon8866 streamvault
Lemon8866
References () https://github.com/lemon8866/StreamVault/releases/tag/251226 - () https://github.com/lemon8866/StreamVault/releases/tag/251226 - Product, Release Notes
References () https://github.com/lemon8866/StreamVault/security/advisories/GHSA-c747-q388-3v6m - () https://github.com/lemon8866/StreamVault/security/advisories/GHSA-c747-q388-3v6m - Exploit, Vendor Advisory
CPE cpe:2.3:a:lemon8866:streamvault:*:*:*:*:*:*:*:*

27 Dec 2025, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-27 00:15

Updated : 2026-03-09 13:41


NVD link : CVE-2025-66203

Mitre link : CVE-2025-66203

CVE.ORG link : CVE-2025-66203


JSON object : View

Products Affected

lemon8866

  • streamvault
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')