CVE-2026-35449
PHP vulnerability analysis and mitigation

Summary

The install/test.php diagnostic script has its CLI-only access guard disabled by commenting out the die() statement. The script remains accessible via HTTP after installation, exposing video viewer statistics including IP addresses, session IDs, and user agents to unauthenticated visitors.

Details

The disabled guard at install/test.php:5-7:

if (!isCommandLineInterface()) {
    //return die('Command Line only');
}

The script also enables verbose error reporting:

error_reporting(E_ALL);
ini_set('display_errors', '1');

It then queries VideoStatistic::getLastStatistics() and outputs the result via var_dump():

$resp = VideoStatistic::getLastStatistics(getVideos_id(), User::getId());
var_dump($resp);

The VideoStatistic object contains: ip (viewer IP address), session_id, user_agent, users_id, and JSON metadata. The display_errors=1 setting also leaks internal filesystem paths in any PHP warnings. The install/ directory is not restricted by .htaccess (it only disables directory listing via Options -Indexes) and no web server rules block access to individual PHP files in this directory.

Proof of Concept


# Request viewer stats for video ID 1
curl "https://your-avideo-instance.com/install/test.php?videos_id=1"

Confirmed accessible on live AVideo instances (HTTP 200).

Impact

Unauthenticated disclosure of viewer IP addresses (PII under GDPR), session identifiers, and user agents. The enabled display_errors also reveals internal server paths on errors.

  • CWE: CWE-200 (Exposure of Sensitive Information)
  • Severity: Low

Uncomment the CLI guard at install/test.php:6 to restore the intended access restriction: php if (!isCommandLineInterface()) { return die('Command Line only'); }

Found by aisafe.io


SourceNVD

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-35452MEDIUM5.3
  • PHPPHP
  • wwbn/avideo
NoNoApr 04, 2026
CVE-2026-35450MEDIUM5.3
  • PHPPHP
  • wwbn/avideo
NoNoApr 04, 2026
CVE-2026-35449MEDIUM5.3
  • PHPPHP
  • wwbn/avideo
NoNoApr 04, 2026
CVE-2026-35181MEDIUM4.3
  • PHPPHP
  • wwbn/avideo
NoNoApr 03, 2026
CVE-2026-35448LOW3.7
  • PHPPHP
  • wwbn/avideo
NoNoApr 04, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management