CVE-2023-47861: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WWBN AVideo
A cross-site scripting (xss) vulnerability exists in the channelBody.php user name functionality of WWBN AVideo 11.6 and dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
AI Analysis
Technical Summary
CVE-2023-47861 is a critical cross-site scripting (XSS) vulnerability identified in the WWBN AVideo platform, versions 11.6 and the development master branch (commit 15fed957fb). The vulnerability resides in the channelBody.php script's handling of the user name input, where improper neutralization of input allows an attacker to inject arbitrary JavaScript code. This occurs because the application fails to properly sanitize or encode user-supplied data before embedding it into web pages, violating CWE-79 standards. Exploitation involves sending a specially crafted HTTP request containing malicious script code embedded in the user name parameter. When a victim user visits a webpage that triggers this vulnerability, the malicious JavaScript executes in their browser context, potentially allowing session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The CVSS 3.1 base score is 9.0 (critical), reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, requiring privileges and user interaction, and scope change. Although no known exploits have been reported in the wild, the vulnerability's nature and severity make it a significant risk for organizations deploying AVideo for video content management or streaming. The vulnerability's exploitation could lead to widespread compromise of user accounts and sensitive data, especially in environments where users have elevated privileges or access to sensitive content. The lack of official patches at the time of reporting necessitates immediate mitigation efforts by administrators.
Potential Impact
For European organizations using WWBN AVideo, this vulnerability poses a critical risk to user data confidentiality, system integrity, and service availability. Successful exploitation could lead to session hijacking, unauthorized access to video content, and potential lateral movement within networks if administrative accounts are compromised. This is particularly concerning for media companies, educational institutions, and enterprises relying on AVideo for internal or public video streaming services. The impact extends to reputational damage, regulatory non-compliance (e.g., GDPR breaches due to data exposure), and operational disruptions. Given the high CVSS score and the possibility of scope change, attackers might leverage this XSS flaw to escalate privileges or inject further malicious payloads. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger the exploit, increasing the attack surface. European organizations with remote or hybrid workforces may face elevated risks as users access AVideo platforms from various locations and devices.
Mitigation Recommendations
Immediate mitigation should focus on input validation and output encoding within the AVideo platform, specifically sanitizing the user name field in channelBody.php to neutralize any embedded scripts. Until an official patch is released, administrators should implement web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting this parameter. Restricting user privileges to the minimum necessary can reduce the impact of exploitation. User education campaigns should warn about phishing attempts that could deliver malicious links exploiting this vulnerability. Monitoring web server logs for suspicious HTTP requests targeting the user name parameter can help detect attempted exploitation. Additionally, organizations should consider isolating or segmenting the AVideo service to limit lateral movement if compromise occurs. Regular backups and incident response plans should be updated to address potential XSS incidents. Finally, organizations should track vendor communications for patches and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2023-47861: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WWBN AVideo
Description
A cross-site scripting (xss) vulnerability exists in the channelBody.php user name functionality of WWBN AVideo 11.6 and dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2023-47861 is a critical cross-site scripting (XSS) vulnerability identified in the WWBN AVideo platform, versions 11.6 and the development master branch (commit 15fed957fb). The vulnerability resides in the channelBody.php script's handling of the user name input, where improper neutralization of input allows an attacker to inject arbitrary JavaScript code. This occurs because the application fails to properly sanitize or encode user-supplied data before embedding it into web pages, violating CWE-79 standards. Exploitation involves sending a specially crafted HTTP request containing malicious script code embedded in the user name parameter. When a victim user visits a webpage that triggers this vulnerability, the malicious JavaScript executes in their browser context, potentially allowing session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The CVSS 3.1 base score is 9.0 (critical), reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, requiring privileges and user interaction, and scope change. Although no known exploits have been reported in the wild, the vulnerability's nature and severity make it a significant risk for organizations deploying AVideo for video content management or streaming. The vulnerability's exploitation could lead to widespread compromise of user accounts and sensitive data, especially in environments where users have elevated privileges or access to sensitive content. The lack of official patches at the time of reporting necessitates immediate mitigation efforts by administrators.
Potential Impact
For European organizations using WWBN AVideo, this vulnerability poses a critical risk to user data confidentiality, system integrity, and service availability. Successful exploitation could lead to session hijacking, unauthorized access to video content, and potential lateral movement within networks if administrative accounts are compromised. This is particularly concerning for media companies, educational institutions, and enterprises relying on AVideo for internal or public video streaming services. The impact extends to reputational damage, regulatory non-compliance (e.g., GDPR breaches due to data exposure), and operational disruptions. Given the high CVSS score and the possibility of scope change, attackers might leverage this XSS flaw to escalate privileges or inject further malicious payloads. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger the exploit, increasing the attack surface. European organizations with remote or hybrid workforces may face elevated risks as users access AVideo platforms from various locations and devices.
Mitigation Recommendations
Immediate mitigation should focus on input validation and output encoding within the AVideo platform, specifically sanitizing the user name field in channelBody.php to neutralize any embedded scripts. Until an official patch is released, administrators should implement web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting this parameter. Restricting user privileges to the minimum necessary can reduce the impact of exploitation. User education campaigns should warn about phishing attempts that could deliver malicious links exploiting this vulnerability. Monitoring web server logs for suspicious HTTP requests targeting the user name parameter can help detect attempted exploitation. Additionally, organizations should consider isolating or segmenting the AVideo service to limit lateral movement if compromise occurs. Regular backups and incident response plans should be updated to address potential XSS incidents. Finally, organizations should track vendor communications for patches and apply them promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-11-30T22:22:14.034Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a47376d939959c8021b3e
Added to database: 11/4/2025, 6:34:31 PM
Last enriched: 11/4/2025, 7:02:59 PM
Last updated: 11/5/2025, 1:49:17 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Securing the Open Android Ecosystem with Samsung Knox
CriticalCVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumCVE-2025-58337: CWE-284 Improper Access Control in Apache Software Foundation Apache Doris-MCP-Server
UnknownCVE-2025-12469: CWE-862 Missing Authorization in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.