CVE-2026-27973: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in advplyr audiobookshelf
CVE-2026-27973 is a stored cross-site scripting (XSS) vulnerability in the Audiobookshelf self-hosted audiobook and podcast server, affecting versions prior to 2. 12. 0. The flaw allows attackers with library modification privileges to inject malicious JavaScript via library metadata, which executes in the browsers or WebViews of other users. This can lead to session hijacking, data theft, and unauthorized access to device APIs. The vulnerability requires high privileges and user interaction, limiting its ease of exploitation. It is fixed in Audiobookshelf version 2. 12. 0 and the corresponding mobile app 0. 12.
AI Analysis
Technical Summary
CVE-2026-27973 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 that affects the Audiobookshelf self-hosted audiobook and podcast server and its mobile application. The vulnerability exists in versions prior to 2.12.0 of the server and 0.12.0-beta of the mobile app. It arises from improper neutralization of input during web page generation, specifically through maliciously crafted library metadata. An attacker who has privileges to modify the audiobook library can inject arbitrary JavaScript code into the metadata fields. When other users access the affected content via browsers or embedded WebViews in the mobile app, the malicious script executes in their context. This can lead to session hijacking, unauthorized data access, exfiltration, and potentially unauthorized access to native device APIs exposed through the WebView environment. Exploitation requires the attacker to have library modification privileges, which implies some level of authentication and trust. Additionally, the victim must interact with the malicious content for the script to execute. The vulnerability is fixed in Audiobookshelf version 2.12.0 and the corresponding mobile app version 0.12.0-beta. The CVSS v3.1 base score is 4.0, indicating medium severity, with attack vector network, attack complexity high, privileges required high, user interaction required, and impact limited to confidentiality and integrity. No public exploits or active exploitation have been reported to date.
Potential Impact
The primary impact of this vulnerability is on confidentiality and integrity of user sessions and data within the Audiobookshelf environment. Successful exploitation can lead to session hijacking, allowing attackers to impersonate legitimate users and access sensitive audiobook or podcast content. Data exfiltration is possible, potentially exposing user information or private library metadata. Access to native device APIs via WebView could allow attackers to perform unauthorized actions on the victim's device, depending on the permissions granted to the app. However, the requirement for attacker privileges to modify the library and user interaction limits the scope and ease of exploitation. Organizations relying on Audiobookshelf for self-hosted media streaming may face risks of unauthorized access and data compromise, particularly in environments with multiple users having library modification rights. The vulnerability could be exploited to undermine user trust and privacy, and in some cases, lead to lateral movement if the compromised device is part of a larger network.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Audiobookshelf to version 2.12.0 or later and update the mobile application to version 0.12.0-beta or newer. Restrict library modification privileges strictly to trusted users to reduce the risk of malicious metadata injection. Implement input validation and sanitization on all user-supplied metadata fields to prevent injection of executable scripts. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the web interface and mobile WebViews. Monitor logs and user activity for unusual modifications to library metadata or unexpected user behavior. Educate users about the risks of interacting with untrusted content within the app. Consider isolating the Audiobookshelf server within a segmented network zone to limit potential lateral movement in case of compromise. Regularly review and audit user permissions and update the application promptly when security patches are released.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Sweden, Japan, South Korea
CVE-2026-27973: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in advplyr audiobookshelf
Description
CVE-2026-27973 is a stored cross-site scripting (XSS) vulnerability in the Audiobookshelf self-hosted audiobook and podcast server, affecting versions prior to 2. 12. 0. The flaw allows attackers with library modification privileges to inject malicious JavaScript via library metadata, which executes in the browsers or WebViews of other users. This can lead to session hijacking, data theft, and unauthorized access to device APIs. The vulnerability requires high privileges and user interaction, limiting its ease of exploitation. It is fixed in Audiobookshelf version 2. 12. 0 and the corresponding mobile app 0. 12.
AI-Powered Analysis
Technical Analysis
CVE-2026-27973 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 that affects the Audiobookshelf self-hosted audiobook and podcast server and its mobile application. The vulnerability exists in versions prior to 2.12.0 of the server and 0.12.0-beta of the mobile app. It arises from improper neutralization of input during web page generation, specifically through maliciously crafted library metadata. An attacker who has privileges to modify the audiobook library can inject arbitrary JavaScript code into the metadata fields. When other users access the affected content via browsers or embedded WebViews in the mobile app, the malicious script executes in their context. This can lead to session hijacking, unauthorized data access, exfiltration, and potentially unauthorized access to native device APIs exposed through the WebView environment. Exploitation requires the attacker to have library modification privileges, which implies some level of authentication and trust. Additionally, the victim must interact with the malicious content for the script to execute. The vulnerability is fixed in Audiobookshelf version 2.12.0 and the corresponding mobile app version 0.12.0-beta. The CVSS v3.1 base score is 4.0, indicating medium severity, with attack vector network, attack complexity high, privileges required high, user interaction required, and impact limited to confidentiality and integrity. No public exploits or active exploitation have been reported to date.
Potential Impact
The primary impact of this vulnerability is on confidentiality and integrity of user sessions and data within the Audiobookshelf environment. Successful exploitation can lead to session hijacking, allowing attackers to impersonate legitimate users and access sensitive audiobook or podcast content. Data exfiltration is possible, potentially exposing user information or private library metadata. Access to native device APIs via WebView could allow attackers to perform unauthorized actions on the victim's device, depending on the permissions granted to the app. However, the requirement for attacker privileges to modify the library and user interaction limits the scope and ease of exploitation. Organizations relying on Audiobookshelf for self-hosted media streaming may face risks of unauthorized access and data compromise, particularly in environments with multiple users having library modification rights. The vulnerability could be exploited to undermine user trust and privacy, and in some cases, lead to lateral movement if the compromised device is part of a larger network.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Audiobookshelf to version 2.12.0 or later and update the mobile application to version 0.12.0-beta or newer. Restrict library modification privileges strictly to trusted users to reduce the risk of malicious metadata injection. Implement input validation and sanitization on all user-supplied metadata fields to prevent injection of executable scripts. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the web interface and mobile WebViews. Monitor logs and user activity for unusual modifications to library metadata or unexpected user behavior. Educate users about the risks of interacting with untrusted content within the app. Consider isolating the Audiobookshelf server within a segmented network zone to limit potential lateral movement in case of compromise. Regularly review and audit user permissions and update the application promptly when security patches are released.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-25T03:24:57.793Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699fabd8b7ef31ef0b7dea2c
Added to database: 2/26/2026, 2:11:36 AM
Last enriched: 2/26/2026, 2:28:22 AM
Last updated: 2/26/2026, 11:30:02 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.