CVE-2026-34739
Stored Cross-Site Scripting in WWBN AVideo User_Location Plugin
Publication date: 2026-03-31
Last updated on: 2026-04-01
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wwbn | avideo | to 26.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the WWBN AVideo platform, specifically in the User_Location plugin's testIP.php page in versions 26.0 and prior. The page reflects the 'ip' request parameter directly into an HTML input element without proper output encoding such as htmlspecialchars(). This lack of encoding allows an attacker to inject arbitrary HTML and JavaScript code via a crafted URL.
Although the vulnerable page is restricted to admin users, the platform's SameSite=None cookie configuration enables cross-origin exploitation. This means an attacker can trick an admin into clicking a malicious link, which then executes JavaScript in the admin's authenticated session.
At the time of publication, no public patches are available to fix this issue.
How can this vulnerability impact me? :
This vulnerability can lead to cross-site scripting (XSS) attacks that allow an attacker to execute arbitrary JavaScript in the context of an authenticated admin user session.
- An attacker could steal sensitive information accessible to the admin, such as session tokens or credentials.
- The attacker might perform unauthorized actions on behalf of the admin user.
- It could lead to further compromise of the system or data breaches.
What immediate steps should I take to mitigate this vulnerability?
Since there are no publicly available patches at the time of publication, immediate mitigation steps include restricting access to the User_Location plugin's testIP.php page to trusted admin users only and avoiding clicking on suspicious or untrusted links that could exploit the vulnerability.
Additionally, consider reviewing and modifying cookie settings, especially the SameSite attribute, to prevent cross-origin exploitation.
Monitoring admin user activity and educating admins about the risks of clicking on untrusted URLs can also help reduce the risk.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows an attacker to execute arbitrary JavaScript in an authenticated admin session via cross-origin exploitation due to improper output encoding and cookie configuration.
Such unauthorized code execution and potential session hijacking could lead to unauthorized access to sensitive data or administrative functions.
This situation may impact compliance with standards like GDPR and HIPAA, which require protection of personal data and secure access controls, by increasing the risk of data breaches or unauthorized data exposure.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by testing the User_Location plugin's testIP.php page for reflected Cross-Site Scripting (XSS) by injecting a crafted ip parameter in the URL and observing if the input is reflected without proper encoding.
A simple detection method is to send a request to the vulnerable URL with a payload that includes HTML or JavaScript code and check if it is executed or reflected in the response.
- Use curl or wget to send a request with a test XSS payload, for example:
- curl -i "https://your-avideo-instance.com/plugin/User_Location/testIP.php?ip=\"><script>alert('XSS')</script>"
- Check the HTTP response body for the presence of the injected script tag or unescaped characters in the input field's value attribute.
- Alternatively, use a browser to visit the crafted URL and observe if an alert box or injected script executes, indicating the vulnerability.