Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 28 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ytgrabber-tui
Ytgrabber-tui ytgrabber-tui |
|
| Vendors & Products |
Ytgrabber-tui
Ytgrabber-tui ytgrabber-tui |
Tue, 14 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Oct 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | yt-grabber-tui is a terminal user interface application for downloading videos. In versions before 1.0-rc, the application allows users to configure the path to the yt-dlp executable via the path_to_yt_dlp configuration setting. An attacker with write access to the configuration file or the filesystem location of the configured executable can replace the executable with malicious code or create a symlink to an arbitrary executable. When the application invokes yt-dlp, the malicious code is executed with the privileges of the user running yt-grabber-tui. This vulnerability has been patched in version 1.0-rc. | |
| Title | yt-grabber-tui allows arbitrary code execution via configurable yt-dlp path | |
| Weaknesses | CWE-59 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-14T15:16:16.648Z
Reserved: 2025-10-10T14:22:48.202Z
Link: CVE-2025-62363
Updated: 2025-10-14T15:16:13.013Z
Status : Deferred
Published: 2025-10-13T22:15:33.910
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-62363
No data.
OpenCVE Enrichment
Updated: 2025-10-28T10:24:39Z