Impact
The flaw resides in the parseVideoInfo function of the fileThumb plugin, where the ffmpegBin argument is not properly sanitized, allowing a crafted value to be injected into the system shell. If exploited, an attacker can execute arbitrary commands on the host, compromising confidentiality, integrity, and availability of the affected installation.
Affected Systems
Kalcaddle Kodbox installations using the fileThumb plugin, specifically versions up to 1.64, are affected. The vulnerability is present in the VideoResize.class.php file located within the plugin's source code.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote, as the exploit can be triggered via a network request that manipulates the ffmpegBin parameter. Public disclosure means the risk of exploitation is non‑negligible, especially if no mitigation is applied.
OpenCVE Enrichment