StreamVault is a video download integration solution. Prior to version 251126, a Remote Code Execution (RCE) vulnerability exists in the stream-vault application (SpiritApplication). The application allows administrators to configure yt-dlp arguments via the /admin/api/saveConfig endpoint without sufficient validation. These arguments are stored globally and subsequently used in YtDlpUtil.java when constructing the command line to execute yt-dlp. This issue has been patched in version 251126.
Metrics
Affected Vendors & Products
References
History
Fri, 26 Dec 2025 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | StreamVault is a video download integration solution. Prior to version 251126, a Remote Code Execution (RCE) vulnerability exists in the stream-vault application (SpiritApplication). The application allows administrators to configure yt-dlp arguments via the /admin/api/saveConfig endpoint without sufficient validation. These arguments are stored globally and subsequently used in YtDlpUtil.java when constructing the command line to execute yt-dlp. This issue has been patched in version 251126. | |
| Title | StreamVault is Vulnerable to Authenticated Remote Code Execution (RCE) via ytdlpargs Configuration Injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-26T23:37:03.817Z
Reserved: 2025-11-24T23:01:29.677Z
Link: CVE-2025-66203
No data.
Status : Received
Published: 2025-12-27T00:15:41.590
Modified: 2025-12-27T00:15:41.590
Link: CVE-2025-66203
No data.
OpenCVE Enrichment
No data.