๐Ÿ” CVE Alert

CVE-2026-31953

MEDIUM 6.4

Xibo CMS has Stored XSS via Notification Body with Zero-Click Execution on Login

CVSS Score
6.4
EPSS Score
0.0%
EPSS Percentile
0th

Xibo is an open source digital signage platform with a web content management system and Windows display player software. A stored Cross-Site Scripting (XSS) vulnerability in versions prior to 4.4.1 allows an authenticated user with notification creation permissions to inject arbitrary JavaScript into the notification body. When the notification is set as an "interrupt," the payload executes automatically in the browser of any targeted user upon login, requiring zero user interaction. Exploitation of the vulnerability is possible on behalf of an authorized user who has both of the following privileges, which are not granted to non-admins as standard: Access to the Notification Centre to view past notifications, and include "Add Notification" button to allow for the creation of new notifications. Users should upgrade to version 4.4.1 which fixes this issue. Upgrading to a fixed version is necessary to remediate. Users unable to upgrade should revoke such privileges from users they do not trust.

CWE CWE-79
Vendor xibosignage
Product xibo-cms
Published Apr 24, 2026
Stay Ahead of the Next One

Get instant alerts for xibosignage xibo-cms

Be the first to know when new medium vulnerabilities affecting xibosignage xibo-cms are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

xibosignage / xibo-cms
< 4.4.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-85w9-c833-q4w2 github.com: https://github.com/xibosignage/xibo-cms/releases/tag/4.4.1