Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-48730: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WWBN AVideo

0
High
VulnerabilityCVE-2023-48730cvecve-2023-48730cwe-79
Published: Wed Jan 10 2024 (01/10/2024, 15:48:11 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

A cross-site scripting (xss) vulnerability exists in the navbarMenuAndLogo.php user name functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:05:49 UTC

Technical Analysis

CVE-2023-48730 is a cross-site scripting (XSS) vulnerability classified under CWE-79 found in the WWBN AVideo platform, an open-source video hosting and streaming solution. The vulnerability resides in the navbarMenuAndLogo.php file, specifically in the user name handling functionality. Improper neutralization of input allows an attacker to inject arbitrary JavaScript code via a specially crafted HTTP request. When a user visits a maliciously crafted webpage exploiting this flaw, the injected script executes in the context of the victim's browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability affects the dev master commit 15fed957fb version of AVideo, with no official patch released yet. The CVSS 3.1 score is 8.5, reflecting high severity due to the impact on confidentiality, integrity, and availability, combined with network attack vector, low privileges required, and no user interaction needed. The attack complexity is high, meaning exploitation requires specific conditions or knowledge. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to deployments of AVideo, especially in environments where user authentication and sensitive data are involved. The vulnerability’s scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component, potentially impacting the entire application or user sessions.

Potential Impact

For European organizations using WWBN AVideo, this vulnerability can lead to severe consequences including unauthorized access to user accounts, theft of sensitive information, and disruption of video streaming services. Given AVideo’s role in hosting and streaming video content, exploitation could result in defacement or injection of malicious content into video portals, damaging organizational reputation and user trust. Confidentiality breaches could expose private or proprietary video content, while integrity violations might allow attackers to manipulate displayed information or user data. Availability could be impacted if attackers leverage the vulnerability to perform denial-of-service attacks or disrupt normal platform operations. Organizations in sectors such as media, education, and corporate communications that rely on AVideo for content delivery are particularly at risk. The high CVSS score underscores the potential for widespread impact if exploited, especially in environments with multiple users and sensitive data. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, emphasizing the need for proactive mitigation.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the vulnerable version of AVideo, especially limiting exposure to untrusted networks. 2. Implement strict input validation and output encoding on the user name field in navbarMenuAndLogo.php to neutralize malicious scripts. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4. Monitor web server logs for unusual or suspicious HTTP requests targeting the user name parameter. 5. Educate users to avoid clicking on suspicious links that could trigger the XSS payload. 6. If possible, isolate the AVideo deployment behind web application firewalls (WAFs) configured to detect and block XSS attack patterns. 7. Regularly update and patch the AVideo platform once an official fix is released by WWBN. 8. Conduct security testing and code reviews focusing on input handling in web page generation components. 9. Consider deploying multi-factor authentication to reduce the impact of session hijacking. 10. Backup critical data and configurations to enable rapid recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-11-30T22:15:02.579Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a47396d939959c8021ba3

Added to database: 11/4/2025, 6:34:33 PM

Last enriched: 11/4/2025, 7:05:49 PM

Last updated: 11/5/2025, 2:11:29 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats