CVE-2025-34434

9.1 CRITICAL

📋 TL;DR

AVideo versions before 20.1 with the ImageGallery plugin enabled are vulnerable to unauthenticated file upload and deletion. Attackers can upload malicious files or delete images from any image-based video without authentication. This affects all AVideo installations using the vulnerable plugin configuration.

💻 Affected Systems

Products:
  • AVideo
Versions: All versions prior to 20.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires ImageGallery plugin to be enabled. The plugin may be enabled by default in some configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers upload webshells or malware to gain persistent access, compromise the server, and potentially pivot to internal networks.

🟠

Likely Case

Attackers deface websites by replacing/deleting images, upload malicious files for phishing campaigns, or disrupt video content.

🟢

If Mitigated

Limited to temporary service disruption if proper file validation and network segmentation exist.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires simple HTTP requests to vulnerable endpoints. Public technical details available in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20.1

Vendor Advisory: https://github.com/WWBN/AVideo/commit/4a53ab2056

Restart Required: No

Instructions:

1. Update AVideo to version 20.1 or later. 2. Verify ImageGallery plugin is updated. 3. No service restart required for web application.

🔧 Temporary Workarounds

Disable ImageGallery Plugin

all

Temporarily disable the vulnerable plugin until patching is complete.

Navigate to AVideo admin panel > Plugins > Disable ImageGallery plugin

Web Server File Restriction

linux

Configure web server to block access to ImageGallery plugin endpoints.

# Apache: Add to .htaccess
RewriteRule ^plugin/ImageGallery/ - [F]
# Nginx: Add to server block
location ~ ^/plugin/ImageGallery/ { deny all; }

🧯 If You Can't Patch

  • Implement strict network ACLs to limit access to AVideo administration interfaces
  • Deploy WAF rules to block unauthenticated requests to /plugin/ImageGallery/ endpoints

🔍 How to Verify

Check if Vulnerable:

Check if AVideo version is below 20.1 and ImageGallery plugin is enabled in admin panel.

Check Version:

Check AVideo configuration file or admin panel dashboard for version information.

Verify Fix Applied:

Confirm AVideo version is 20.1+ and test that unauthenticated requests to /plugin/ImageGallery/ endpoints return authentication errors.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated POST requests to /plugin/ImageGallery/upload.php
  • Unauthenticated DELETE requests to /plugin/ImageGallery/ endpoints
  • Unexpected file uploads to gallery directories

Network Indicators:

  • Unusual traffic patterns to ImageGallery endpoints from unauthenticated sources
  • File uploads to gallery paths without preceding authentication requests

SIEM Query:

source="web_logs" AND (uri_path="/plugin/ImageGallery/" AND (http_method="POST" OR http_method="DELETE") AND user_agent!="*bot*")

🔗 References

📤 Share & Export