Impact
The vulnerability allows an authenticated user with upload permission to submit arbitrary HTML via the message POST parameter to notifySubscribers.json.php. The payload is inserted directly into an email template without sanitization and rendered as HTML, enabling attackers to send phishing links, tracking pixels, or UI spoofing to all subscribers. The emails appear to come from the platform's official address and branding, potentially deceiving up to 10,000 recipients on a single channel.
Affected Systems
WWBN AVideo versions up to and including 29.0 are affected. The issue was resolved in a later commit. Users of these versions on any supported operating systems must review their installation.
Risk and Exploitability
The CVSS score is 6.4, indicating moderate severity. No EPSS value is available, and the vulnerability is not listed in the CISA KEV catalog. The attack requires authentication and upload permissions, so insider access or compromised user credentials are prerequisites. Once satisfied, an attacker can broadcast malicious HTML to thousands of subscribers via the platform‑branded email interface.
OpenCVE Enrichment
Github GHSA