Description
HackerOne community member Huynh Pham Thanh Luc (nigh7c0r3) has reported a reflected XSS vulnerability in the afr.php delivery script of Revive Adserver. An attacker can craft a specific URL that includes an HTML payload in a parameter. If a logged in administrator visits the URL, the HTML is sent to the browser and malicious scripts would be executed.
Published: 2026-01-20
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting (XSS) Vulnerability
Action: Apply Patch
AI Analysis

Impact

A reflected XSS flaw exists in the afr.php delivery script used by Revive Adserver. When an attacker crafts a URL containing malicious HTML content in a parameter, a logged‑in administrator who visits that URL will have the payload rendered by their browser, enabling the execution of arbitrary scripts in the context of the administrator account. Because the attack requires the target to be authenticated, successful exploitation can lead to session hijacking, credential theft, or further lateral movement within the system.

Affected Systems

Revive Adserver supplied by Revive. No specific affected versions are listed in the CVE data, so all deployed installations of Revive Adserver may be at risk until a vendor patch is released.

Risk and Exploitability

The flaw carries a moderate severity CVSS score of 6.1. The EPSS score is reported at less than 1%, indicating low but non‑zero likelihood of exploitation. The vulnerability is not currently listed in the CISA KEV catalog. The attacker must be a logged‑in administrator, and the threat vector is inferred to be a web‑based attack via a crafted URL. Given the moderate score and low exploitation probability, the risk is moderate but the potential impact on confidentiality and integrity is significant if an administrator is compromised.

Generated by OpenCVE AI on April 18, 2026 at 04:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Revive Adserver to the latest version once a security patch addressing the afr.php XSS issue is released.
  • Limit access to the afr.php endpoint by configuring authentication checks or disabling the script for non‑admin users until a fix is available.
  • Implement input sanitization or a web application firewall to block reflected XSS payloads reaching the afr.php script.
  • Enforce strong administrator credentials and enable multi‑factor authentication to reduce the impact of potential exploitation.

Generated by OpenCVE AI on April 18, 2026 at 04:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Sat, 18 Apr 2026 05:00:00 +0000

Type Values Removed Values Added
Title Reflected Cross‑Site Scripting in Revive Adserver afr.php Delivery Script

Tue, 03 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Aquaplatform
Aquaplatform revive Adserver
CPEs cpe:2.3:a:aquaplatform:revive_adserver:*:*:*:*:*:*:*:*
Vendors & Products Aquaplatform
Aquaplatform revive Adserver

Wed, 21 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 21 Jan 2026 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Revive
Revive adserver
Vendors & Products Revive
Revive adserver

Tue, 20 Jan 2026 21:00:00 +0000

Type Values Removed Values Added
Description HackerOne community member Huynh Pham Thanh Luc (nigh7c0r3) has reported a reflected XSS vulnerability in the afr.php delivery script of Revive Adserver. An attacker can craft a specific URL that includes an HTML payload in a parameter. If a logged in administrator visits the URL, the HTML is sent to the browser and malicious scripts would be executed.
References
Metrics cvssV3_0

{'score': 6.1, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Aquaplatform Revive Adserver
Revive Adserver
cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2026-01-21T20:45:35.234Z

Reserved: 2026-01-02T15:00:02.871Z

Link: CVE-2026-21664

cve-icon Vulnrichment

Updated: 2026-01-21T20:45:22.627Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-20T21:16:07.223

Modified: 2026-02-03T21:04:36.013

Link: CVE-2026-21664

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T04:45:36Z

Weaknesses