Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27568: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WWBN AVideo

0
Medium
VulnerabilityCVE-2026-27568cvecve-2026-27568cwe-79
Published: Tue Feb 24 2026 (02/24/2026, 14:53:20 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

WWBN AVideo is an open source video platform. Prior to version 21.0, AVideo allows Markdown in video comments and uses Parsedown (v1.7.4) without Safe Mode enabled. Markdown links are not sufficiently sanitized, allowing `javascript:` URIs to be rendered as clickable links. An authenticated low-privilege attacker can post a malicious comment that injects persistent JavaScript. When another user clicks the link, the attacker can perform actions such as session hijacking, privilege escalation (including admin takeover), and data exfiltration. Version 21.0 contains a fix. As a workaround, validate and block unsafe URI schemes (e.g., `javascript:`) before rendering Markdown, and enable Parsedown Safe Mode.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 18:52:42 UTC

Technical Analysis

WWBN AVideo is an open-source video platform that prior to version 21.0 allowed users to post comments containing Markdown. The platform uses Parsedown v1.7.4 to parse Markdown but does not enable its Safe Mode feature, which is designed to prevent unsafe content. This lack of sanitization allows an authenticated low-privilege attacker to embed malicious JavaScript code within Markdown links using unsafe URI schemes such as 'javascript:'. These malicious links are rendered as clickable in the comments section, enabling persistent cross-site scripting (XSS). When other users click these links, the injected JavaScript executes in their browsers, potentially allowing attackers to hijack user sessions, escalate privileges to administrative levels, and exfiltrate sensitive data. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation). Exploitation requires the attacker to be authenticated with low privileges and requires victim user interaction (clicking the malicious link). The vulnerability has a CVSS 4.0 base score of 5.1, indicating medium severity. The fix in version 21.0 involves enabling Parsedown Safe Mode and validating/blocking unsafe URI schemes before rendering Markdown. No known exploits are reported in the wild as of now.

Potential Impact

This vulnerability can significantly impact organizations using WWBN AVideo versions prior to 21.0 by enabling attackers to perform persistent XSS attacks. The consequences include session hijacking, which can lead to unauthorized access to user accounts, including administrative accounts if privilege escalation is successful. This compromises the confidentiality and integrity of user data and platform content. Data exfiltration risks threaten sensitive information leakage. The persistent nature of the XSS means the malicious payload remains in comments, potentially affecting many users over time. Although exploitation requires authentication and user interaction, the low privilege needed to inject malicious content broadens the attacker base. Organizations relying on AVideo for video hosting and community engagement may face reputational damage, user trust erosion, and compliance issues if exploited. The medium severity score reflects the moderate ease of exploitation combined with significant potential impact on user security and platform integrity.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade WWBN AVideo to version 21.0 or later, where Parsedown Safe Mode is enabled and unsafe URI schemes are properly sanitized. Until upgrading is possible, administrators should implement input validation to explicitly block unsafe URI schemes such as 'javascript:', 'data:', and other potentially dangerous protocols in Markdown links within comments. Enabling Parsedown Safe Mode manually, if feasible, will reduce the risk of unsafe content rendering. Additionally, applying Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of inline scripts and untrusted sources. Monitoring user comments for suspicious links and educating users about the risks of clicking unknown links can further reduce exploitation chances. Regularly auditing and sanitizing user-generated content and limiting comment posting privileges to trusted users can also help contain risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T17:40:28.448Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e0f3fbe58cf853b290d9b

Added to database: 2/24/2026, 8:51:11 PM

Last enriched: 3/4/2026, 6:52:42 PM

Last updated: 4/10/2026, 7:03:04 PM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses