GHSA-99j6-hj87-6fcf

Suggest an improvement
Source
https://github.com/advisories/GHSA-99j6-hj87-6fcf
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-99j6-hj87-6fcf/GHSA-99j6-hj87-6fcf.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-99j6-hj87-6fcf
Aliases
  • CVE-2026-35452
Published
2026-04-04T06:17:17Z
Modified
2026-04-04T06:35:09.304826Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
AVideo: Unauthenticated Information Disclosure via Missing Auth on CloneSite client.log.php
Details

Summary

The plugin/CloneSite/client.log.php endpoint serves the clone operation log file without any authentication. Every other endpoint in the CloneSite plugin directory enforces User::isAdmin(). The log contains internal filesystem paths, remote server URLs, and SSH connection metadata.

Details

The entire file at plugin/CloneSite/client.log.php:

<?php
include '../../videos/cache/clones/client.log';

No authentication check. The log file is populated by cloneClient.json.php which writes operational details during clone operations:

// plugin/CloneSite/cloneClient.json.php:118
$log->add("Clone (2 of {$totalSteps}): Geting MySQL Dump file [$cmd]");

The $cmd variable contains wget commands with internal filesystem paths, and rsync command templates with SSH connection details (username, IP, port).

Compare with sibling endpoints: - plugin/CloneSite/index.php checks User::isAdmin() - plugin/CloneSite/changeStatus.json.php checks User::isAdmin() - plugin/CloneSite/clones.json.php checks User::isAdmin() - plugin/CloneSite/delete.json.php checks User::isAdmin()

Proof of Concept

curl "https://your-avideo-instance.com/plugin/CloneSite/client.log.php"

If the CloneSite feature has been used, the response contains wget commands, filesystem paths, SSH metadata, and SQL dump file locations.

Impact

Unauthenticated disclosure of internal infrastructure details that could aid targeted attacks against the clone source server.

Recommended Fix

Add an admin authentication check at plugin/CloneSite/client.log.php, before the include:

require_once '../../videos/configuration.php';
if (!User::isAdmin()) {
    http_response_code(403);
    die('Access denied');
}

Found by aisafe.io

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2026-04-04T06:17:17Z",
    "severity": "MODERATE",
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-200"
    ]
}
References

Affected packages

Packagist / wwbn/avideo

Package

Name
wwbn/avideo
Purl
pkg:composer/wwbn/avideo

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
26.0

Affected versions

10.*
10.4
10.8
Other
11
11.*
11.1
11.1.1
11.5
11.6
12.*
12.4
14.*
14.3
14.3.1
14.4
18.*
18.0
21.*
21.0
22.*
22.0
24.*
24.0
25.*
25.0
26.*
26.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/04/GHSA-99j6-hj87-6fcf/GHSA-99j6-hj87-6fcf.json"