Arbitrary Code Execution Vulnerability in yt-grabber-tui by zheny-creator
CVE-2025-62363

7.8HIGH

Key Information:

Vendor
CVE Published:
13 October 2025

What is CVE-2025-62363?

The yt-grabber-tui application, designed for downloading videos via a terminal interface, has a vulnerability that allows an attacker to replace the path to the yt-dlp executable in the configuration file with malicious code. This can occur if the attacker has write permissions to the configuration file or its filesystem. When yt-grabber-tui is used, the malicious code will run with the user's privileges, potentially compromising the user's system. This issue has been addressed in the latest version 1.0-rc.

Affected Version(s)

YtGrabber-TUI < 1.0-rc

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-62363 : Arbitrary Code Execution Vulnerability in yt-grabber-tui by zheny-creator