CVE-2026-24140
📋 TL;DR
MyTube versions 1.7.78 and below have a mass assignment vulnerability in settings management that allows attackers to modify arbitrary application settings. This affects self-hosted MyTube instances where attackers can send unauthorized property names that get persisted to the database. The vulnerability requires access to the settings management functionality.
💻 Affected Systems
- MyTube
📦 What is this software?
Mytube by Franklioxygen
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains administrative control by modifying authentication or authorization settings, potentially leading to complete system compromise.
Likely Case
Attacker modifies application settings to disrupt functionality, change download behavior, or alter player configurations.
If Mitigated
Limited impact with proper input validation and access controls restricting settings modification to authorized users only.
🎯 Exploit Status
Exploitation requires access to settings management functionality but is technically simple once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.7.78
Vendor Advisory: https://github.com/franklioxygen/MyTube/security/advisories/GHSA-c938-x24g-fxcx
Restart Required: Yes
Instructions:
1. Backup your current MyTube installation and database. 2. Download version 1.7.78 or later from the official repository. 3. Replace the existing installation with the updated version. 4. Restart the MyTube service. 5. Verify the fix by checking the version.
🔧 Temporary Workarounds
Input Validation Middleware
allAdd middleware to validate allowed settings properties before they reach saveSettings() function.
# Requires modifying application code to implement property whitelisting
Access Restriction
linuxRestrict access to settings management endpoints to trusted IP addresses or authenticated admin users only.
# Configure web server (nginx/apache) to restrict /settings endpoints
# Example nginx: location ~ ^/settings { allow 192.168.1.0/24; deny all; }
🧯 If You Can't Patch
- Implement network segmentation to isolate MyTube instances from sensitive systems
- Enable detailed logging of all settings modification attempts and monitor for suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check if your MyTube version is 1.7.78 or below by examining the application version in the web interface or configuration files.
Check Version:
Check web interface settings page or examine package.json/version file in installation directory
Verify Fix Applied:
After updating, verify the version shows 1.7.78 or higher and test that unauthorized property names are rejected when attempting to modify settings.
📡 Detection & Monitoring
Log Indicators:
- Unusual settings modification requests
- POST requests to settings endpoints with unexpected parameter names
- Database writes to settings table with non-standard keys
Network Indicators:
- HTTP requests to /api/settings or similar endpoints with unusual parameters
- Burst of settings modification attempts
SIEM Query:
source="mytube.log" AND (uri_path="/api/settings" OR uri_path="/settings") AND (http_method="POST" OR http_method="PUT") | stats count by src_ip, form_data