MyTube is a self-hosted downloader and player for several video websites. Versions 1.7.78 and below have a Mass Assignment vulnerability in the settings management functionality due to insufficient input validation. The application's saveSettings() function accepts arbitrary key-value pairs without validating property names against allowed settings. The function uses Record<string, any> as input type and iterates over all entries using Object.entries() without filtering unauthorized properties. Any field sent by the attacker is directly persisted to the database, regardless of whether it corresponds to a legitimate application setting. This issue has been fixed in version 1.7.78.
Metrics
Affected Vendors & Products
References
History
Mon, 26 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Franklioxygen
Franklioxygen mytube |
|
| Vendors & Products |
Franklioxygen
Franklioxygen mytube |
Sat, 24 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MyTube is a self-hosted downloader and player for several video websites. Versions 1.7.78 and below have a Mass Assignment vulnerability in the settings management functionality due to insufficient input validation. The application's saveSettings() function accepts arbitrary key-value pairs without validating property names against allowed settings. The function uses Record<string, any> as input type and iterates over all entries using Object.entries() without filtering unauthorized properties. Any field sent by the attacker is directly persisted to the database, regardless of whether it corresponds to a legitimate application setting. This issue has been fixed in version 1.7.78. | |
| Title | MyTube has Mass Assignment via Settings Management | |
| Weaknesses | CWE-915 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-01-23T23:59:56.045Z
Updated: 2026-01-26T16:17:58.728Z
Reserved: 2026-01-21T18:38:22.475Z
Link: CVE-2026-24140
Updated: 2026-01-26T16:14:36.654Z
Status : Awaiting Analysis
Published: 2026-01-24T00:15:49.450
Modified: 2026-01-26T15:03:33.357
Link: CVE-2026-24140
No data.