Impact
An open‑source video platform contains a flaw in the sanitizeFFmpegCommand() function that removes many shell metacharacters but fails to strip the Bash command substitution syntax $(). The sanitized command is executed via sh -c inside execAsync(), so a crafted encrypted ffmpeg payload can cause arbitrary command execution on the standalone encoder server, compromising confidentiality, integrity, and availability.
Affected Systems
The affected vendor is WWBN, product AVideo. Versions up to and including 26.0 contain the vulnerability; newer releases include the patched implementation.
Risk and Exploitability
The CVSS score is 8.1, indicating high severity. EPSS is below 1%, suggesting low likelihood of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog. If the standalone encoder is accessible from the internet or an attacker can submit a valid encrypted ffmpeg payload, execution of arbitrary shell commands is possible, implying a remote attack vector.
OpenCVE Enrichment
Github GHSA