Skip to main content

CVE-2025-41420: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WWBN AVideo

Critical
VulnerabilityCVE-2025-41420cvecve-2025-41420cwe-79
Published: Thu Jul 24 2025 (07/24/2025, 15:11:00 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

A cross-site scripting (xss) vulnerability exists in the userLogin cancelUri parameter functionality of WWBN AVideo 14.4 and dev master commit 8a8954ff. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 07/24/2025, 15:48:58 UTC

Technical Analysis

CVE-2025-41420 is a critical cross-site scripting (XSS) vulnerability identified in WWBN's AVideo platform, specifically affecting version 14.4 and the development master commit 8a8954ff. The vulnerability arises from improper neutralization of user-supplied input in the 'cancelUri' parameter within the userLogin functionality. This flaw allows an attacker to craft a malicious HTTP request containing executable JavaScript code. When a legitimate user visits a specially crafted webpage or link, the injected script executes in the context of the victim's browser session. The vulnerability is classified under CWE-79, indicating a failure to properly sanitize input during web page generation. The CVSS v3.1 base score is 9.6, reflecting a critical severity level due to its network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating that successful exploitation can lead to full compromise of user data, session hijacking, and potentially disruption of service. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a high-risk target for attackers aiming to execute arbitrary scripts, steal credentials, or perform session fixation attacks. The lack of available patches at the time of publication increases the urgency for mitigation and monitoring.

Potential Impact

For European organizations using WWBN AVideo version 14.4 or the specified development commit, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive video content, user credentials, and administrative functions, undermining confidentiality and integrity of data. Given that AVideo is a platform for video hosting and streaming, organizations relying on it for internal communications, training, or public content distribution could face reputational damage, data breaches, and regulatory non-compliance, especially under GDPR requirements. The ability to execute arbitrary JavaScript in users' browsers can facilitate phishing, session hijacking, and lateral movement within networks. This is particularly critical for sectors such as education, media, and corporate enterprises that use AVideo for content delivery. The high severity and ease of exploitation without authentication increase the likelihood of targeted attacks or opportunistic exploitation, potentially impacting business continuity and user trust.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the vulnerable 'cancelUri' parameter by implementing strict input validation and output encoding to neutralize malicious scripts. Organizations should deploy web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the userLogin endpoint. Monitoring HTTP request logs for anomalous patterns involving the 'cancelUri' parameter can help identify attempted exploits. Until an official patch is released, consider disabling or restricting the userLogin cancelUri functionality if feasible. Educate users to avoid clicking on suspicious links and implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts. Regularly update the AVideo platform once patches become available and conduct thorough security testing on custom integrations. Additionally, implement multi-factor authentication to reduce the impact of credential theft resulting from XSS attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2025-07-02T21:36:44.857Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6882521dad5a09ad003a1566

Added to database: 7/24/2025, 3:32:45 PM

Last enriched: 7/24/2025, 3:48:58 PM

Last updated: 8/30/2025, 7:36:57 PM

Views: 32

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats