AVideo is a video-sharing Platform software. Prior to version 7.0, an unauthenticated attacker can execute arbitrary OS commands on the server by injecting shell command substitution into the base64Url GET parameter. This can lead to full server compromise, data exfiltration (e.g., configuration secrets, internal keys, credentials), and service disruption. This issue has been patched in version 7.0.
References
| Link | Resource |
|---|---|
| https://github.com/WWBN/AVideo-Encoder/security/advisories/GHSA-9j26-99jh-v26q | Mitigation Vendor Advisory |
Configurations
History
10 Mar 2026, 19:14
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:wwbn:avideo-encoder:*:*:*:*:*:*:*:* | |
| First Time |
Wwbn
Wwbn avideo-encoder |
|
| References | () https://github.com/WWBN/AVideo-Encoder/security/advisories/GHSA-9j26-99jh-v26q - Mitigation, Vendor Advisory |
06 Mar 2026, 07:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-06 07:16
Updated : 2026-03-10 19:14
NVD link : CVE-2026-29058
Mitre link : CVE-2026-29058
CVE.ORG link : CVE-2026-29058
JSON object : View
Products Affected
wwbn
- avideo-encoder
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
