Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the YPTWallet Stripe payment confirmation page directly echoes the `$_REQUEST['plugin']` parameter into a JavaScript block without any encoding or sanitization. The `plugin` parameter is not included in any of the framework's input filter lists defined in `security.php`, so it passes through completely raw. An attacker can inject arbitrary JavaScript by crafting a malicious URL and sending it to a victim user. The same script block also outputs the current user's username and password hash via `User::getUserName()` and `User::getUserPass()`, meaning a successful XSS exploitation can immediately exfiltrate these credentials. Commit fa0bc102493a15d79fe03f86c07ab7ca1b5b63e2 fixes the issue.
Published: 2026-03-27
Score: 8.2 High
EPSS: n/a
KEV: No
Impact: Cross-Site Scripting that can exfiltrate user credentials
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the YPTWallet Stripe payment confirmation page, which echoes the 'plugin' request parameter without sanitization. Because this parameter is not filtered by the framework, an attacker can inject arbitrary JavaScript into the page. The injected script runs in the victim's browser and can read the rendered username and password hash from the page. Thus the attacker can steal credentials and potentially use them for further attacks.

Affected Systems

The affected product is WWBN AVideo. Versions up to and including 26.0 are vulnerable. The issue was fixed in a later commit.

Risk and Exploitability

This flaw has a CVSS score of 8.2, indicating a high severity. The exploit is remote and requires an attacker to send a malicious URL that includes a crafted 'plugin' parameter to a victim user. No exploit probability score is available and the vulnerability is not listed in the CISA KEV catalog. An attacker who succeeds can exfiltrate credentials and cause significant damage.

Generated by OpenCVE AI on March 27, 2026 at 19:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest AVideo update that includes the fix for the XSS issue.
  • If an immediate upgrade is not possible, modify the YPTWallet Stripe payment confirmation page to properly sanitize or remove the 'plugin' request parameter before rendering it.
  • Configure a web application firewall to block or alert on suspicious 'plugin' parameter values containing script tags.
  • Verify that the page no longer displays the 'plugin' variable and that user credentials are not exposed.

Generated by OpenCVE AI on March 27, 2026 at 19:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Description WWBN AVideo is an open source video platform. In versions up to and including 26.0, the YPTWallet Stripe payment confirmation page directly echoes the `$_REQUEST['plugin']` parameter into a JavaScript block without any encoding or sanitization. The `plugin` parameter is not included in any of the framework's input filter lists defined in `security.php`, so it passes through completely raw. An attacker can inject arbitrary JavaScript by crafting a malicious URL and sending it to a victim user. The same script block also outputs the current user's username and password hash via `User::getUserName()` and `User::getUserPass()`, meaning a successful XSS exploitation can immediately exfiltrate these credentials. Commit fa0bc102493a15d79fe03f86c07ab7ca1b5b63e2 fixes the issue.
Title AVideo Vulnerable to Reflected XSS via Unsanitized plugin Parameter in YPTWallet Stripe Payment Page
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T18:17:32.604Z

Reserved: 2026-03-27T13:43:14.369Z

Link: CVE-2026-34375

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T19:16:43.107

Modified: 2026-03-27T19:16:43.107

Link: CVE-2026-34375

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T20:27:47Z

Weaknesses