Description
WWBN AVideo is an open source video platform. In versions 26.0 and prior, AVideo's EPG (Electronic Program Guide) feature parses XML from user-controlled URLs and renders programme titles directly into HTML without any sanitization or escaping. A user with upload permission can set a video's epg_link to a malicious XML file whose <title> elements contain JavaScript. This payload executes in the browser of any unauthenticated visitor to the public EPG page, enabling session hijacking and account takeover.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rqp3-gf5h-mrqx | WWBN AVideo has Stored XSS via Malicious EPG XML Program Titles in AVideo EPG Page |
References
History
Tue, 07 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WWBN AVideo is an open source video platform. In versions 26.0 and prior, AVideo's EPG (Electronic Program Guide) feature parses XML from user-controlled URLs and renders programme titles directly into HTML without any sanitization or escaping. A user with upload permission can set a video's epg_link to a malicious XML file whose <title> elements contain JavaScript. This payload executes in the browser of any unauthenticated visitor to the public EPG page, enabling session hijacking and account takeover. | |
| Title | WWBN AVideo has Stored XSS via Malicious EPG XML Program Titles in AVideo EPG Page | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T19:22:07.732Z
Reserved: 2026-04-06T21:29:17.350Z
Link: CVE-2026-39367
No data.
Status : Received
Published: 2026-04-07T20:16:30.677
Modified: 2026-04-07T20:16:30.677
Link: CVE-2026-39367
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA