CVE-2025-54072
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-22

Last updated on: 2025-10-09

Assigner: GitHub, Inc.

Description
yt-dlp is a feature-rich command-line audio/video downloader. In versions 2025.06.25 and below, when the --exec option is used on Windows with the default placeholder (or {}), insufficient sanitization is applied to the expanded filepath, allowing for remote code execution. This is a bypass of the mitigation for CVE-2024-22423 where the default placeholder and {} were not covered by the new escaping rules. Windows users who are unable to upgrade should avoid using --exec altogether. Instead, the --write-info-json or --dump-json options could be used, with an external script or command line consuming the JSON output. This is fixed in version 2025.07.21.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-22
Last Modified
2025-10-09
Generated
2026-05-07
AI Q&A
2025-07-23
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
yt-dlp_project yt-dlp to 2025.07.21 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in yt-dlp versions 2025.06.25 and below occurs when the --exec option is used on Windows with the default placeholder (or {}). Insufficient sanitization of the expanded filepath allows an attacker to execute remote code. It bypasses previous mitigation efforts for CVE-2024-22423 because the default placeholder and {} were not properly escaped.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker to execute arbitrary code remotely on a Windows system running vulnerable versions of yt-dlp with the --exec option. This can lead to full compromise of the affected system, including unauthorized access, data theft, or system damage.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, Windows users should avoid using the --exec option with yt-dlp until they can upgrade to version 2025.07.21 or later. Instead, use the --write-info-json or --dump-json options and process the JSON output with an external script or command line. Upgrading to version 2025.07.21, where the issue is fixed, is the recommended solution.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart