GHSA-2f9h-23f7-8gcx: AVideo affected by unauthenticated application takeover via exposed web installer on uninitialized deployments
highvulnerability
security
Summary
AVideo's web installer endpoint (`install/checkConfiguration.php`) allows unauthenticated attackers to fully set up the application on fresh deployments by sending POST requests with attacker-controlled database credentials, admin passwords, and configuration values. Since the only protection is checking if a configuration file exists, attackers can take over uninitialized instances by pointing them to an attacker-controlled database and creating admin accounts with attacker-chosen passwords.
Vulnerability Details
EPSS (30-day exploit probability)
EPSS: 0.0%
Disclosure Date
March 17, 2026
Classification
Attack SophisticationModerate
Affected Packages
wwbn/avideo@<= 25.0
Original source: https://github.com/advisories/GHSA-2f9h-23f7-8gcx
First tracked: March 17, 2026 at 04:00 PM
Classified by LLM (prompt v3) · confidence: 95%