Impact
This vulnerability arises from the public git.json.php file in WWBN AVideo, which runs "git log -1" and returns the full output as JSON to any user. The output includes the exact deployed commit hash, developer names, developer email addresses, and commit messages. This exposure satisfies CWE‑200, leading to disclosure of sensitive internal information and potential for version fingerprinting against known CVEs.
Affected Systems
The affected product is WWBN AVideo, versions 29.0 and earlier. Any installation that exposes the git.json.php file in the web root is susceptible.
Risk and Exploitability
The CVSS score is 5.3, indicating moderate severity. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog, so the current exploitation likelihood is uncertain. The likely attack vector is unauthenticated HTTP requests to the exposed file, allowing remote attackers to retrieve internal data without authentication.
OpenCVE Enrichment