Skip to main content

CVE-2025-50128: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WWBN AVideo

Critical
VulnerabilityCVE-2025-50128cvecve-2025-50128cwe-79
Published: Thu Jul 24 2025 (07/24/2025, 15:11:03 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

A cross-site scripting (xss) vulnerability exists in the videoNotFound 404ErrorMsg parameter functionality of WWBN AVideo 14.4 and dev master commit 8a8954ff. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 07/24/2025, 15:48:09 UTC

Technical Analysis

CVE-2025-50128 is a critical cross-site scripting (XSS) vulnerability identified in WWBN's AVideo platform, specifically affecting version 14.4 and the development master branch at commit 8a8954ff. The vulnerability arises from improper neutralization of input in the 'videoNotFound' 404ErrorMsg parameter functionality. This flaw allows an attacker to craft a malicious HTTP request containing specially designed input that, when processed by the vulnerable AVideo instance, results in the execution of arbitrary JavaScript code within the context of the victim's browser. The vulnerability is triggered when a user visits a maliciously crafted webpage or link, which exploits the XSS flaw to run scripts that can hijack user sessions, steal cookies, perform actions on behalf of the user, or redirect users to malicious sites. The CVSS v3.1 base score of 9.6 reflects the high severity, with attributes indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a prime target for exploitation once weaponized. The lack of available patches at the time of publication increases the urgency for mitigation and monitoring. This vulnerability is categorized under CWE-79, which is a common and dangerous web application security issue related to improper input sanitization during web page generation.

Potential Impact

For European organizations using WWBN AVideo 14.4 or the affected development versions, this vulnerability poses a significant risk. Successful exploitation can lead to session hijacking, credential theft, unauthorized actions performed on behalf of users, and potential spread of malware through injected scripts. This can compromise user data confidentiality and integrity, disrupt service availability, and damage organizational reputation. Given the nature of AVideo as a video platform, organizations relying on it for internal communications, training, or public content delivery could face operational disruptions and data breaches. The cross-site scripting flaw also opens pathways for phishing and social engineering attacks targeting employees or customers. In sectors with strict data protection regulations such as GDPR, exploitation could lead to regulatory penalties and legal consequences. The requirement for user interaction means that phishing or social engineering campaigns could be used to trigger the exploit, increasing the risk in environments with less security awareness. The scope change attribute indicates that the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting other parts of the web application or connected systems.

Mitigation Recommendations

Immediate mitigation steps include implementing strict input validation and output encoding on the 'videoNotFound' 404ErrorMsg parameter to neutralize malicious scripts. Organizations should monitor for updates or patches from WWBN and apply them promptly once available. In the interim, deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the vulnerable parameter can reduce risk. Security teams should conduct thorough code reviews and penetration testing focused on input handling in AVideo instances. User education campaigns to raise awareness about phishing and suspicious links can reduce the likelihood of successful exploitation. Additionally, organizations should implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Logging and monitoring web traffic for anomalous requests targeting the vulnerable endpoint can help in early detection of exploitation attempts. If feasible, restricting access to the AVideo platform to trusted networks or VPNs can limit exposure. Finally, organizations should prepare incident response plans specific to XSS incidents to quickly contain and remediate any breaches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2025-06-29T06:46:41.904Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6882521dad5a09ad003a156f

Added to database: 7/24/2025, 3:32:45 PM

Last enriched: 7/24/2025, 3:48:09 PM

Last updated: 8/30/2025, 4:58:50 PM

Views: 36

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats