Cyber Posture

CVE-2026-41058

HighPublic PoC

Published: 21 April 2026

Published
21 April 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0007 20.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-41058 is a high-severity Path Traversal (CWE-22) vulnerability in Wwbn Avideo. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation and sanitization of the deleteDump GET parameter to block path traversal sequences like ../../ that enable arbitrary unlink() calls.

prevent

Mandates enforcement mechanisms in the application to restrict file access and deletion to authorized paths only, preventing low-privileged users from targeting arbitrary files.

prevent

Requires timely identification, prioritization, and patching of flaws like this incomplete path traversal fix, referencing the provided remediation commit.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
Why these techniques?

Path traversal in public-facing web app (AVideo) directly enables remote exploitation for arbitrary file deletion via unlink().

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

WWBN AVideo is an open source video platform. In versions 29.0 and below, the incomplete fix for AVideo's CloneSite `deleteDump` parameter does not apply path traversal filtering, allowing `unlink()` of arbitrary files via `../../` sequences in the GET parameter. Commit…

more

3c729717c26f160014a5c86b0b6accdbd613e7b2 contains an updated fix.

Deeper analysisAI

CVE-2026-41058 is a path traversal vulnerability (CWE-22) in WWBN AVideo, an open source video platform, affecting versions 29.0 and below. The issue stems from an incomplete fix in the CloneSite `deleteDump` parameter, which lacks proper path traversal filtering. This allows attackers to supply `../../` sequences via a GET parameter to invoke `unlink()` on arbitrary files on the server. The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H).

A low-privileged authenticated user (PR:L) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity and no user interaction required. Successful exploitation enables deletion of arbitrary files, resulting in high integrity (I:H) and availability (A:H) impacts but no confidentiality loss (C:N).

GitHub security advisories, including GHSA-5879-4fmr-xwf2, GHSA-xmjm-86qv-g226, and GHSA-5879-4fmr-xwf2, document the flaw and reference prior related issues. Mitigation is available in commit 3c729717c26f160014a5c86b0b6accdbd613e7b2, which provides an updated fix; an earlier commit 941decd6d19e2e694acb75e86317d10fbb560284 contained only a partial remediation.

Details

CWE(s)

Affected Products

wwbn
avideo
≤ 29.0

CVEs Like This One

CVE-2026-33493Same product: Wwbn Avideo
CVE-2026-33292Same product: Wwbn Avideo
CVE-2026-33293Same product: Wwbn Avideo
CVE-2026-40909Same product: Wwbn Avideo
CVE-2026-33681Same product: Wwbn Avideo
CVE-2026-33513Same product: Wwbn Avideo
CVE-2026-39369Same product: Wwbn Avideo
CVE-2026-33479Same product: Wwbn Avideo
CVE-2026-40925Same product: Wwbn Avideo
CVE-2026-41056Same product: Wwbn Avideo

References