Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester.
CVE-2026-35449 is a low severity vulnerability with a CVSS score of 0.0. No known public exploits at this time.
Very low probability of exploitation
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
The install/test.php diagnostic script has its CLI-only access guard disabled by commenting out the die() statement. The script remains accessible via HTTP after installation, exposing video viewer statistics including IP addresses, session IDs, and user agents to unauthenticated visitors.
The disabled guard at install/test.php:5-7:
if (!isCommandLineInterface()) {
//return die('Command Line only');
}
The script also enables verbose error reporting:
error_reporting(E_ALL);
ini_set('display_errors', '1');
It then queries VideoStatistic::getLastStatistics() and outputs the result via var_dump():
$resp = VideoStatistic::getLastStatistics(getVideos_id(), User::getId());
var_dump($resp);
The VideoStatistic object contains: ip (viewer IP address), session_id, user_agent, users_id, and JSON metadata. The display_errors=1 setting also leaks internal filesystem paths in any PHP warnings.
The install/ directory is not restricted by .htaccess (it only disables directory listing via Options -Indexes) and no web server rules block access to individual PHP files in this directory.
# Request viewer stats for video ID 1
curl "https://your-avideo-instance.com/install/test.php?videos_id=1"
Confirmed accessible on live AVideo instances (HTTP 200).
Unauthenticated disclosure of viewer IP addresses (PII under GDPR), session identifiers, and user agents. The enabled display_errors also reveals internal server paths on errors.
Uncomment the CLI guard at install/test.php:6 to restore the intended access restriction:
if (!isCommandLineInterface()) {
return die('Command Line only');
}
Found by aisafe.io
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.