CVE-2023-30854: Remote code injection in wwbn/avideo
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.98028%
CWE
Published
4/27/2023
Updated
11/4/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| wwbn/avideo | composer | < 12.4 | 12.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability occurs in the code where the $cmd variable is built using user-controlled $objClone->cloneSiteURL and $json->sqlFile. These values are not sanitized before being passed to exec(), allowing command injection. The patch adds escaping (escapeshellarg) and regex filtering to $json->sqlFile, confirming the lack of sanitization was the root cause. The direct use of unsanitized user input in an OS command execution context (via exec()) makes this function clearly vulnerable.