CVE-2025-62613
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-22

Last updated on: 2025-10-27

Assigner: GitHub, Inc.

Description
VDO.Ninja is a tool that brings remote video feeds into OBS or other studio software via WebRTC. From versions 28.0 to before 28.4, a reflected Cross-Site Scripting (XSS) vulnerability exists on examples/control.html through the room parameter, which is improperly sanitized before being rendered in the DOM. The application fails to validate and encode user input, allowing malicious scripts to be injected and executed. This issue has been patched in version 28.4.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-22
Last Modified
2025-10-27
Generated
2026-05-07
AI Q&A
2025-10-23
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
steveseguin vdo.ninja 28.0
steveseguin vdo.ninja 28.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a reflected Cross-Site Scripting (XSS) issue in VDO.Ninja versions 28.0 to before 28.4. It occurs on the examples/control.html page through the room parameter, which is not properly sanitized before being rendered in the DOM. This allows an attacker to inject and execute malicious scripts in the context of the user's browser.


How can this vulnerability impact me? :

The vulnerability can allow attackers to execute malicious scripts in the user's browser, potentially leading to theft of sensitive information, session hijacking, or performing actions on behalf of the user without their consent.


What immediate steps should I take to mitigate this vulnerability?

Upgrade VDO.Ninja to version 28.4 or later, as this version contains the patch that fixes the reflected Cross-Site Scripting (XSS) vulnerability in examples/control.html related to the room parameter.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart