๐Ÿ” CVE Alert

CVE-2026-39367

MEDIUM 5.4

WWBN AVideo has Stored XSS via Malicious EPG XML Program Titles in AVideo EPG Page

CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
8th

WWBN AVideo is an open source video platform. In versions 26.0 and prior, AVideo's EPG (Electronic Program Guide) feature parses XML from user-controlled URLs and renders programme titles directly into HTML without any sanitization or escaping. A user with upload permission can set a video's epg_link to a malicious XML file whose <title> elements contain JavaScript. This payload executes in the browser of any unauthenticated visitor to the public EPG page, enabling session hijacking and account takeover.

CWE CWE-79
Vendor wwbn
Product avideo
Published Apr 7, 2026
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for wwbn avideo

Be the first to know when new medium vulnerabilities affecting wwbn avideo are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

WWBN / AVideo
<= 26.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/WWBN/AVideo/security/advisories/GHSA-rqp3-gf5h-mrqx github.com: https://github.com/WWBN/AVideo/commit/e0212add4aad0f1e97758a4b4fdc57df58ce68e8