CVE-2026-21642
BaseFortify
Publication date: 2026-01-20
Last updated on: 2026-01-30
Assigner: HackerOne
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| aquaplatform | revive_adserver | to 6.0.4 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
If exploited, this vulnerability can allow attackers to execute malicious scripts in the browser of an administrator. This can lead to unauthorized actions performed with the administrator's privileges, potential theft of sensitive information, session hijacking, or other malicious activities.
Can you explain this vulnerability to me?
This vulnerability is a reflected Cross-Site Scripting (XSS) issue in the 'banner-acl.php' and 'channel-acl.php' scripts of Revive Adserver. An attacker can create a specially crafted URL containing malicious HTML code in a parameter. When a logged-in administrator clicks this URL, the malicious code is executed in their browser.