First published: Fri May 12 2023(Updated: )
WWBN AVideo is an open source video platform. In versions 12.4 and prior, a command injection vulnerability exists at `plugin/CloneSite/cloneClient.json.php` which allows Remote Code Execution if you CloneSite Plugin. This is a bypass to the fix for CVE-2023-30854, which affects WWBN AVideo up to version 12.3. This issue is patched in commit 1df4af01f80d56ff2c4c43b89d0bac151e7fb6e3.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
WWBN AVideo | <=12.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32073 has a severity score of 8.8 (High).
The vulnerability in versions 12.4 and prior allows Remote Code Execution via command injection in the `cloneClient.json.php` file when using the CloneSite Plugin.
At the time of writing, there may not be an official fix available. It is recommended to monitor official sources for updates.