Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21664: Vulnerability in Revive Revive Adserver

0
Medium
VulnerabilityCVE-2026-21664cvecve-2026-21664
Published: Tue Jan 20 2026 (01/20/2026, 20:48:47 UTC)
Source: CVE Database V5
Vendor/Project: Revive
Product: Revive Adserver

Description

CVE-2026-21664 is a reflected cross-site scripting (XSS) vulnerability in the afr. php delivery script of Revive Adserver version 6. An attacker can craft a malicious URL containing an HTML payload that, when visited by a logged-in administrator, executes arbitrary scripts in the administrator's browser. This vulnerability requires user interaction and targets administrators, potentially allowing theft of session tokens or execution of unauthorized actions. The CVSS score is 6. 1 (medium severity), reflecting the network attack vector, low complexity, no privileges required, but user interaction needed. No known exploits are currently in the wild. European organizations using Revive Adserver version 6 should prioritize patching or mitigating this vulnerability to prevent potential administrative account compromise. Countries with significant digital advertising infrastructure and high usage of open-source ad servers are most at risk.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:20:27 UTC

Technical Analysis

CVE-2026-21664 is a reflected cross-site scripting (XSS) vulnerability identified in the afr.php delivery script of Revive Adserver version 6, an open-source ad serving platform widely used for managing and delivering online advertisements. The vulnerability arises because the afr.php script improperly sanitizes user-supplied input parameters, allowing an attacker to inject malicious HTML or JavaScript code into a crafted URL. When a logged-in administrator clicks or visits this malicious URL, the injected script executes within the context of the administrator's browser session. This can lead to session hijacking, unauthorized actions performed with administrator privileges, or theft of sensitive information such as authentication tokens. The vulnerability requires no prior authentication by the attacker but does require that the victim administrator interacts with the malicious URL, making social engineering or phishing a likely attack vector. The CVSS 3.0 base score of 6.1 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, but user interaction needed, and a scope change due to potential impact on administrative privileges. Currently, there are no publicly known exploits in the wild, and no official patches have been linked yet. However, the presence of this vulnerability in a critical administrative component of Revive Adserver necessitates prompt attention from users of version 6 to prevent exploitation.

Potential Impact

For European organizations using Revive Adserver version 6, this vulnerability poses a significant risk to the confidentiality and integrity of their advertising infrastructure. Successful exploitation could allow attackers to hijack administrator sessions, manipulate ad delivery configurations, or inject malicious content into ad campaigns, potentially damaging brand reputation and causing financial loss. Since the vulnerability targets administrators, it could lead to broader compromise of the ad server environment, affecting availability indirectly through administrative disruption. The reflected XSS nature means that exploitation requires tricking administrators into clicking malicious links, which could be facilitated by phishing campaigns targeting marketing or IT staff. Given the widespread use of Revive Adserver in digital marketing across Europe, especially among small to medium enterprises and agencies relying on open-source solutions, the impact could be widespread. Additionally, compromised ad servers could be used to distribute malware or conduct further attacks on end users, amplifying the threat. The medium CVSS score indicates moderate risk, but the potential for privilege escalation and session hijacking elevates the concern for organizations with high-value advertising assets or sensitive customer data.

Mitigation Recommendations

Organizations should immediately audit their use of Revive Adserver version 6 and monitor for any suspicious administrator activity or phishing attempts targeting their staff. Although no official patch links are provided yet, users should apply any forthcoming security updates from the Revive project as a priority. In the interim, administrators should be trained to recognize and avoid clicking on suspicious URLs, especially those received via email or messaging platforms. Implementing web application firewalls (WAFs) with rules to detect and block reflected XSS payloads targeting afr.php can provide a protective layer. Additionally, enforcing multi-factor authentication (MFA) for administrator accounts can reduce the risk of session hijacking leading to full compromise. Organizations should also consider isolating administrative interfaces behind VPNs or IP whitelisting to limit exposure. Regularly reviewing server logs for unusual URL access patterns and conducting security awareness training focused on phishing can further reduce exploitation likelihood. Finally, organizations should prepare incident response plans specific to web application attacks to quickly contain any breach resulting from this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2026-01-02T15:00:02.871Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 696fee344623b1157c4ffe9f

Added to database: 1/20/2026, 9:05:56 PM

Last enriched: 1/20/2026, 9:20:27 PM

Last updated: 1/20/2026, 10:16:56 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2026-0672: CWE-93 in Python Software Foundation CPython

Medium
VulnerabilityTue Jan 20 2026

CVE-2026-21990: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Jan 20 2026

CVE-2026-21989: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Jan 20 2026

CVE-2026-21988: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Jan 20 2026

CVE-2026-21987: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Jan 20 2026

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats