Description
HackerOne community member Patrick Lang (7yr) has reported a reflected XSS vulnerability in the banner-acl.php script of Revive Adserver. An attacker can craft a specific URL that includes an HTML payload in a parameter. If a logged in administrator visits the URL, the HTML is sent to the browser and malicious scripts would be executed.
Published: 2026-01-20
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (script execution for logged‑in administrators)
Action: Apply Patch
AI Analysis

Impact

The banner‑acl.php file of Revive Adserver contains a reflected cross‑site scripting vulnerability. By inserting a crafted URL that embeds HTML or JavaScript into a parameter, an attacker can cause the payload to be rendered when a logged‑in administrator opens the link. The resulting execution of malicious script compromises the administrator’s session and can lead to credential theft, content defacement, or further lateral movement within the advertiser network.

Affected Systems

Any installation of Revive Adserver that has not been updated to include the vendor’s fix for the banner‑acl.php script is affected. The advisory does not specify a version range, so all unpatched deployments are potentially vulnerable.

Risk and Exploitability

The CVSS score of 6.1 indicates a moderate risk, while the EPSS score of less than 1% suggests a low immediate likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog, implying there are no publicly documented exploits. Successful exploitation requires an authenticated administrator to click the crafted link, so an attacker would likely rely on social engineering or a compromised email to deliver the malicious URL. Despite the low exploitation probability, the impact on privileged accounts makes this a high priority to remediate.

Generated by OpenCVE AI on April 18, 2026 at 19:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Revive Adserver release that contains the banner‑acl.php patch.
  • Validate and sanitize all input parameters passed to banner‑acl.php and ensure any reflected data is properly HTML‑escaped before output.
  • Deploy a Content Security Policy that blocks inline scripts and restricts script sources to trusted domains.

Generated by OpenCVE AI on April 18, 2026 at 19:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Sat, 18 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Title Reflected XSS in Revive Adserver Banner ACL

Tue, 03 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Aquaplatform
Aquaplatform revive Adserver
CPEs cpe:2.3:a:aquaplatform:revive_adserver:*:*:*:*:*:*:*:*
Vendors & Products Aquaplatform
Aquaplatform revive Adserver

Wed, 21 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 21 Jan 2026 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Revive
Revive adserver
Vendors & Products Revive
Revive adserver

Tue, 20 Jan 2026 21:00:00 +0000

Type Values Removed Values Added
Description HackerOne community member Patrick Lang (7yr) has reported a reflected XSS vulnerability in the banner-acl.php script of Revive Adserver. An attacker can craft a specific URL that includes an HTML payload in a parameter. If a logged in administrator visits the URL, the HTML is sent to the browser and malicious scripts would be executed.
References
Metrics cvssV3_0

{'score': 6.1, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Aquaplatform Revive Adserver
Revive Adserver
cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2026-01-21T20:42:21.072Z

Reserved: 2026-01-02T15:00:02.870Z

Link: CVE-2026-21663

cve-icon Vulnrichment

Updated: 2026-01-21T20:42:10.635Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-20T21:16:06.443

Modified: 2026-02-03T21:05:31.143

Link: CVE-2026-21663

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T19:15:10Z

Weaknesses