WWBN AVideo is an open source video platform. In versions 26.0 and prior, objects/aVideoEncoderReceiveImage.json.php allowed an authenticated uploader to fetch attacker-controlled same-origin /videos/... URLs, bypass traversal scrubbing, and expose server-local files through the GIF poster storage path. The vulnerable GIF branch could be abused to read local files such as /etc/passwd or application source files and republish those bytes through a normal public GIF media URL.
Cite this page
CVE-2026-39369. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2026-39369
Use CWE-22, Wwbn vendor hub and Avideo product page to widen CVE-2026-39369 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-41064, CVE-2026-41304 and CVE-2026-41055 for nearby disclosures in the same product family.