[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-41064":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-22T10:18:55.356Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":40,"aliases":41,"duplicate_of":9,"upstream":42,"downstream":43,"duplicates":44,"related":45,"reserved_at":9,"published_at":46,"modified_at":46,"state":47,"summary":48,"references_raw":55,"kevs":75,"epss":9,"epss_history":76,"metrics":77,"affected":85},"CVE-2026-41064","WWBN AVideo is an open source video platform. In versions up to and including 29.0, an incomplete fix for AVideo's `test.php` adds `escapeshellarg` for wget but leaves the `file_get_contents` and `curl` code paths unsanitized, and the URL validation regex `/^http/` accepts strings like `httpevil[.]com`. Commit 78bccae74634ead68aa6528d631c9ec4fd7aa536 contains an updated fix.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-78","Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.","weakness","Stable","Base","High",[20,24,28,32,36],{"id":21,"name":22,"techniques":23},"CAPEC-108","Command Line Execution through SQL Injection",[],{"id":25,"name":26,"techniques":27},"CAPEC-15","Command Delimiters",[],{"id":29,"name":30,"techniques":31},"CAPEC-43","Exploiting Multiple Input Interpretation Layers",[],{"id":33,"name":34,"techniques":35},"CAPEC-6","Argument Injection",[],{"id":37,"name":38,"techniques":39},"CAPEC-88","OS Command Injection",[],[],[],[],[],[],[],"2026-04-21T23:04:32.047Z","Received",{"cisa_kev":49,"cisa_ransomware":49,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":50,"severity_score":51,"severity_version":52,"severity_source":53,"severity_vector":54,"severity_status":47},false,"critical",9.3,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N",[56,62,67,71],{"url":57,"sources":58,"tags":60},"https://github.com/WWBN/AVideo/security/advisories/GHSA-pq8p-wc4f-vg7j",[53,59],"nvd",[61],"X Refsource CONFIRM",{"url":63,"sources":64,"tags":65},"https://github.com/WWBN/AVideo/security/advisories/GHSA-3fpm-8rjr-v5mc",[53,59],[66],"X Refsource MISC",{"url":68,"sources":69,"tags":70},"https://github.com/WWBN/AVideo/commit/1e6cf03e93b5a5318204b010ea28440b0d9a5ab3",[53,59],[66],{"url":72,"sources":73,"tags":74},"https://github.com/WWBN/AVideo/commit/78bccae74634ead68aa6528d631c9ec4fd7aa536",[53,59],[66],[],[],[78,83],{"source":53,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":79,"cvss_v4_0":9},{"baseScore":51,"baseSeverity":80,"vectorString":54,"impactScore":81,"exploitabilityScore":82},"CRITICAL",7.8,10,{"source":59,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":84,"cvss_v4_0":9},{"baseScore":51,"baseSeverity":80,"vectorString":54,"impactScore":81,"exploitabilityScore":82},[86],{"ecosystem":9,"name":87,"vendor":88,"product":89,"cpe_part":90,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":91},"AVideo","wwbn","avideo","a",[92],{"version":93,"is_range":94,"range_type":53,"version_start":9,"version_start_type":9,"version_end":95,"version_end_type":96,"fixed_in":9},"\u003C= 29.0",true,"29.0","including"]