CVE-2026-34739
Received Received - Intake
Stored Cross-Site Scripting in WWBN AVideo User_Location Plugin

Publication date: 2026-03-31

Last updated on: 2026-04-01

Assigner: GitHub, Inc.

Description
WWBN AVideo is an open source video platform. In versions 26.0 and prior, the User_Location plugin's testIP.php page reflects the ip request parameter directly into an HTML input element without applying htmlspecialchars() or any other output encoding. This allows an attacker to inject arbitrary HTML and JavaScript via a crafted URL. Although the page is restricted to admin users, AVideo's SameSite=None cookie configuration allows cross-origin exploitation, meaning an attacker can lure an admin to a malicious link that executes JavaScript in their authenticated session. At time of publication, there are no publicly available patches.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-31
Last Modified
2026-04-01
Generated
2026-05-07
AI Q&A
2026-04-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wwbn avideo to 26.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the WWBN AVideo platform, specifically in the User_Location plugin's testIP.php page in versions 26.0 and prior. The page reflects the 'ip' request parameter directly into an HTML input element without proper output encoding such as htmlspecialchars(). This lack of encoding allows an attacker to inject arbitrary HTML and JavaScript code via a crafted URL.

Although the vulnerable page is restricted to admin users, the platform's SameSite=None cookie configuration enables cross-origin exploitation. This means an attacker can trick an admin into clicking a malicious link, which then executes JavaScript in the admin's authenticated session.

At the time of publication, no public patches are available to fix this issue.


How can this vulnerability impact me? :

This vulnerability can lead to cross-site scripting (XSS) attacks that allow an attacker to execute arbitrary JavaScript in the context of an authenticated admin user session.

  • An attacker could steal sensitive information accessible to the admin, such as session tokens or credentials.
  • The attacker might perform unauthorized actions on behalf of the admin user.
  • It could lead to further compromise of the system or data breaches.

What immediate steps should I take to mitigate this vulnerability?

Since there are no publicly available patches at the time of publication, immediate mitigation steps include restricting access to the User_Location plugin's testIP.php page to trusted admin users only and avoiding clicking on suspicious or untrusted links that could exploit the vulnerability.

Additionally, consider reviewing and modifying cookie settings, especially the SameSite attribute, to prevent cross-origin exploitation.

Monitoring admin user activity and educating admins about the risks of clicking on untrusted URLs can also help reduce the risk.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an attacker to execute arbitrary JavaScript in an authenticated admin session via cross-origin exploitation due to improper output encoding and cookie configuration.

Such unauthorized code execution and potential session hijacking could lead to unauthorized access to sensitive data or administrative functions.

This situation may impact compliance with standards like GDPR and HIPAA, which require protection of personal data and secure access controls, by increasing the risk of data breaches or unauthorized data exposure.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the User_Location plugin's testIP.php page for reflected Cross-Site Scripting (XSS) by injecting a crafted ip parameter in the URL and observing if the input is reflected without proper encoding.

A simple detection method is to send a request to the vulnerable URL with a payload that includes HTML or JavaScript code and check if it is executed or reflected in the response.

  • Use curl or wget to send a request with a test XSS payload, for example:
  • curl -i "https://your-avideo-instance.com/plugin/User_Location/testIP.php?ip=\"><script>alert('XSS')</script>"
  • Check the HTTP response body for the presence of the injected script tag or unescaped characters in the input field's value attribute.
  • Alternatively, use a browser to visit the crafted URL and observe if an alert box or injected script executes, indicating the vulnerability.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart