CVE-2025-34439

6.1 MEDIUM

📋 TL;DR

AVideo versions before 20.1 contain an open redirect vulnerability in the login functionality. Attackers can craft malicious links that redirect users to arbitrary external websites after login, enabling phishing attacks. This affects all AVideo installations running vulnerable versions.

💻 Affected Systems

Products:
  • AVideo
Versions: All versions prior to 20.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable if running affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users are redirected to sophisticated phishing sites that steal credentials or deliver malware, leading to account compromise or system infection.

🟠

Likely Case

Users are redirected to phishing pages attempting to steal login credentials or personal information.

🟢

If Mitigated

Redirects are blocked or users are warned before being redirected to external sites.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking a link) but is technically simple.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20.1

Vendor Advisory: https://github.com/WWBN/AVideo/commit/4a53ab2056

Restart Required: No

Instructions:

1. Backup your AVideo installation. 2. Update to AVideo version 20.1 or later. 3. Verify the update completed successfully.

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side validation to reject or sanitize the cancelUri parameter containing external URLs.

Modify login.php to validate cancelUri parameter against allowed domains

WAF Rule

all

Implement web application firewall rules to block requests with external URLs in cancelUri parameter.

Add WAF rule: Block requests where cancelUri contains 'http://' or 'https://' followed by external domain

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to restrict redirect destinations.
  • Deploy network monitoring to detect and block suspicious redirect patterns.

🔍 How to Verify

Check if Vulnerable:

Check if AVideo version is below 20.1 by examining the version file or admin panel.

Check Version:

grep -r 'version' /path/to/avideo/installation/ or check admin panel

Verify Fix Applied:

Test login functionality with crafted cancelUri parameter to confirm redirects are blocked or validated.

📡 Detection & Monitoring

Log Indicators:

  • HTTP logs showing login requests with cancelUri parameter containing external domains
  • Unusual redirect patterns in access logs

Network Indicators:

  • Outbound connections to unexpected domains following login requests

SIEM Query:

source="web_logs" AND uri="*login.php*" AND query="*cancelUri=*" AND NOT query="*cancelUri=*avideo*"

🔗 References

📤 Share & Export