Skip to main content

CVE-2025-36548: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WWBN AVideo

High
VulnerabilityCVE-2025-36548cvecve-2025-36548cwe-79
Published: Thu Jul 24 2025 (07/24/2025, 15:11:01 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

A cross-site scripting (xss) vulnerability exists in the LoginWordPress loginForm cancelUri parameter functionality of WWBN AVideo 14.4 and dev master commit 8a8954ff. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 07/24/2025, 15:49:22 UTC

Technical Analysis

CVE-2025-36548 is a high-severity cross-site scripting (XSS) vulnerability identified in WWBN's AVideo software, specifically affecting version 14.4 and the development master commit 8a8954ff. The vulnerability arises from improper neutralization of input in the LoginWordPress loginForm's cancelUri parameter. This flaw allows an attacker to craft a malicious HTTP request containing specially designed JavaScript code within the cancelUri parameter. When a user visits a compromised or attacker-controlled webpage that triggers this vulnerability, the injected JavaScript executes in the context of the victim's browser session. This can lead to a range of malicious outcomes including session hijacking, credential theft, unauthorized actions on behalf of the user, and potential spread of malware. The vulnerability requires user interaction, specifically the victim visiting a maliciously crafted URL, and has a CVSS v3.1 score of 8.3, indicating high severity. The attack complexity is high, no privileges are required, but user interaction is necessary. The scope is changed, meaning the vulnerability can impact resources beyond the initially vulnerable component, with high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the presence of this vulnerability in a widely used video platform poses a significant risk if weaponized. The lack of available patches at the time of reporting underscores the urgency for mitigation and monitoring.

Potential Impact

For European organizations using WWBN AVideo, particularly those deploying version 14.4 or the specified development branch, this vulnerability poses a substantial risk. AVideo is often used by educational institutions, media companies, and enterprises for video content management and streaming. Exploitation could lead to unauthorized access to sensitive user data, session hijacking, and manipulation of video content or user accounts. This could result in reputational damage, regulatory non-compliance (notably under GDPR due to potential personal data exposure), and operational disruptions. The cross-site scripting nature of the vulnerability also facilitates phishing and social engineering attacks, increasing the attack surface. Given the high impact on confidentiality, integrity, and availability, organizations could face data breaches and service interruptions. The requirement for user interaction means targeted spear-phishing campaigns could be effective, especially against high-value users or administrators. The absence of known exploits currently provides a window for proactive defense, but the risk of future exploitation remains significant.

Mitigation Recommendations

1. Immediate mitigation should include input validation and sanitization on the cancelUri parameter within the LoginWordPress loginForm to neutralize malicious scripts. 2. Organizations should monitor for updates or patches from WWBN and apply them promptly once available. 3. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the AVideo platform. 4. Employ Web Application Firewalls (WAFs) configured to detect and block XSS attack patterns targeting the cancelUri parameter. 5. Conduct user awareness training emphasizing the risks of clicking on suspicious links, especially those related to login or authentication pages. 6. Regularly audit and review logs for unusual access patterns or repeated attempts to exploit the cancelUri parameter. 7. Consider isolating the AVideo platform within a segmented network zone to limit lateral movement in case of compromise. 8. Use multi-factor authentication (MFA) for user accounts to reduce the impact of session hijacking. These measures, combined, provide layered defense beyond generic advice and address both technical and human factors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2025-07-02T21:36:42.566Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6882521dad5a09ad003a1563

Added to database: 7/24/2025, 3:32:45 PM

Last enriched: 7/24/2025, 3:49:22 PM

Last updated: 8/28/2025, 3:04:02 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats