The vulnerability is a Server-Side Request Forgery (SSRF) located in the plugin/LiveLinks/proxy.php script of AVideo. The script initially validates a user-supplied URL from the livelink parameter using isSSRFSafeURL. However, it then uses PHP's get_headers function, which, prior to the patch, would automatically follow HTTP redirects. If an attacker provided a safe initial URL that redirected to an internal or restricted URL, the script would extract this new, unvalidated URL from the Location header. This malicious URL was then passed directly to the fakeBrowser function. The fakeBrowser function executes a cURL request to any URL provided to it without performing any security checks. This allows an unauthenticated attacker to make the server issue requests to internal network resources, leading to information disclosure (e.g., cloud metadata) and internal network scanning. The patch mitigates this by disabling redirects in get_headers and, more importantly, adding a second validation step using isSSRFSafeURL on the URL from the Location header before it is ever passed to fakeBrowser.