yt-grabber-tui is a terminal user interface application for downloading videos. In versions before 1.0-rc, the application allows users to configure the path to the yt-dlp executable via the path_to_yt_dlp configuration setting. An attacker with write access to the configuration file or the filesystem location of the configured executable can replace the executable with malicious code or create a symlink to an arbitrary executable. When the application invokes yt-dlp, the malicious code is executed with the privileges of the user running yt-grabber-tui. This vulnerability has been patched in version 1.0-rc.
Metrics
Affected Vendors & Products
References
History
Tue, 28 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ytgrabber-tui
Ytgrabber-tui ytgrabber-tui |
|
| Vendors & Products |
Ytgrabber-tui
Ytgrabber-tui ytgrabber-tui |
Tue, 14 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Oct 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | yt-grabber-tui is a terminal user interface application for downloading videos. In versions before 1.0-rc, the application allows users to configure the path to the yt-dlp executable via the path_to_yt_dlp configuration setting. An attacker with write access to the configuration file or the filesystem location of the configured executable can replace the executable with malicious code or create a symlink to an arbitrary executable. When the application invokes yt-dlp, the malicious code is executed with the privileges of the user running yt-grabber-tui. This vulnerability has been patched in version 1.0-rc. | |
| Title | yt-grabber-tui allows arbitrary code execution via configurable yt-dlp path | |
| Weaknesses | CWE-59 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-10-13T21:37:48.474Z
Updated: 2025-10-14T15:16:16.648Z
Reserved: 2025-10-10T14:22:48.202Z
Link: CVE-2025-62363
Updated: 2025-10-14T15:16:13.013Z
Status : Awaiting Analysis
Published: 2025-10-13T22:15:33.910
Modified: 2025-10-14T19:36:29.240
Link: CVE-2025-62363
No data.