Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21642: Vulnerability in Revive Revive Adserver

0
Medium
VulnerabilityCVE-2026-21642cvecve-2026-21642
Published: Tue Jan 20 2026 (01/20/2026, 20:48:48 UTC)
Source: CVE Database V5
Vendor/Project: Revive
Product: Revive Adserver

Description

CVE-2026-21642 is a reflected Cross-Site Scripting (XSS) vulnerability found in Revive Adserver version 6, specifically in the banner-acl. php and channel-acl. php scripts. An attacker can craft a malicious URL containing HTML/JavaScript payloads that, when visited by a logged-in administrator, executes arbitrary scripts in their browser. This vulnerability requires user interaction (administrator clicking the URL) but does not require prior authentication to trigger the malicious URL. The CVSS 3. 0 base score is 6. 1 (medium severity), reflecting limited confidentiality and integrity impact but no availability impact. No known exploits are currently reported in the wild. European organizations using Revive Adserver 6 should prioritize patching or mitigating this issue to prevent potential administrative account compromise or session hijacking.

AI-Powered Analysis

AILast updated: 01/28/2026, 20:21:39 UTC

Technical Analysis

CVE-2026-21642 is a reflected Cross-Site Scripting (XSS) vulnerability identified in Revive Adserver version 6, a widely used open-source ad serving platform. The vulnerability exists in the banner-acl.php and channel-acl.php scripts, which handle access control lists for banners and channels. An attacker can craft a specially constructed URL embedding malicious HTML or JavaScript code within a parameter. When a logged-in administrator clicks or visits this URL, the server reflects the injected payload back in the HTTP response without proper sanitization or encoding, causing the administrator's browser to execute the malicious script. This can lead to session hijacking, credential theft, or unauthorized actions performed with administrator privileges. The vulnerability does not require the attacker to be authenticated but does require the administrator to interact with the malicious link, making social engineering a likely attack vector. The CVSS 3.0 score of 6.1 reflects a medium severity level, with network attack vector, low attack complexity, no privileges required, but user interaction necessary. The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component. No patches or exploits are currently publicly available, but the risk remains significant due to the administrative access level targeted. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS. Organizations using Revive Adserver 6 should be aware of this threat and implement mitigations promptly.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of administrative sessions within Revive Adserver. Successful exploitation could allow attackers to hijack administrator sessions, steal credentials, or perform unauthorized administrative actions such as modifying ad campaigns or redirecting ad traffic. This can lead to financial loss, reputational damage, and potential data leakage. Since Revive Adserver is used by many digital marketing and advertising companies, media agencies, and publishers across Europe, the impact could disrupt advertising operations and compromise sensitive business data. The reflected XSS nature means the attack requires social engineering to trick administrators into clicking malicious links, but once successful, the attacker gains significant control. The vulnerability does not affect availability directly but can indirectly cause service disruption if administrative controls are compromised. Given the medium CVSS score and the administrative level targeted, the impact is moderate but non-negligible, especially for organizations heavily reliant on digital advertising infrastructure.

Mitigation Recommendations

1. Immediately apply any available patches or updates from Revive Adserver addressing this vulnerability once released. 2. If patches are not yet available, implement web application firewall (WAF) rules to detect and block suspicious requests containing script tags or unusual parameters targeting banner-acl.php and channel-acl.php. 3. Educate administrators about the risk of clicking untrusted URLs, especially those received via email or messaging platforms, to reduce the likelihood of social engineering exploitation. 4. Enforce multi-factor authentication (MFA) for administrative accounts to limit the impact of stolen credentials. 5. Review and restrict administrative access to trusted networks or VPNs to reduce exposure. 6. Monitor logs for unusual access patterns or repeated requests to the vulnerable scripts. 7. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser. 8. Regularly audit and sanitize all user inputs and URL parameters in custom deployments or plugins related to Revive Adserver. These steps collectively reduce the risk of exploitation until a vendor patch is applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2026-01-01T15:00:02.340Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 696fee344623b1157c4ffe99

Added to database: 1/20/2026, 9:05:56 PM

Last enriched: 1/28/2026, 8:21:39 PM

Last updated: 2/7/2026, 4:56:58 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats