Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27973: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in advplyr audiobookshelf

0
Medium
VulnerabilityCVE-2026-27973cvecve-2026-27973cwe-79
Published: Thu Feb 26 2026 (02/26/2026, 02:06:49 UTC)
Source: CVE Database V5
Vendor/Project: advplyr
Product: audiobookshelf

Description

CVE-2026-27973 is a stored cross-site scripting (XSS) vulnerability in the Audiobookshelf self-hosted audiobook and podcast server, affecting versions prior to 2. 12. 0. The flaw allows attackers with library modification privileges to inject malicious JavaScript via library metadata, which executes in the browsers or WebViews of other users. This can lead to session hijacking, data theft, and unauthorized access to device APIs. The vulnerability requires high privileges and user interaction, limiting its ease of exploitation. It is fixed in Audiobookshelf version 2. 12. 0 and the corresponding mobile app 0. 12.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:28:22 UTC

Technical Analysis

CVE-2026-27973 is a stored cross-site scripting (XSS) vulnerability classified under CWE-79 that affects the Audiobookshelf self-hosted audiobook and podcast server and its mobile application. The vulnerability exists in versions prior to 2.12.0 of the server and 0.12.0-beta of the mobile app. It arises from improper neutralization of input during web page generation, specifically through maliciously crafted library metadata. An attacker who has privileges to modify the audiobook library can inject arbitrary JavaScript code into the metadata fields. When other users access the affected content via browsers or embedded WebViews in the mobile app, the malicious script executes in their context. This can lead to session hijacking, unauthorized data access, exfiltration, and potentially unauthorized access to native device APIs exposed through the WebView environment. Exploitation requires the attacker to have library modification privileges, which implies some level of authentication and trust. Additionally, the victim must interact with the malicious content for the script to execute. The vulnerability is fixed in Audiobookshelf version 2.12.0 and the corresponding mobile app version 0.12.0-beta. The CVSS v3.1 base score is 4.0, indicating medium severity, with attack vector network, attack complexity high, privileges required high, user interaction required, and impact limited to confidentiality and integrity. No public exploits or active exploitation have been reported to date.

Potential Impact

The primary impact of this vulnerability is on confidentiality and integrity of user sessions and data within the Audiobookshelf environment. Successful exploitation can lead to session hijacking, allowing attackers to impersonate legitimate users and access sensitive audiobook or podcast content. Data exfiltration is possible, potentially exposing user information or private library metadata. Access to native device APIs via WebView could allow attackers to perform unauthorized actions on the victim's device, depending on the permissions granted to the app. However, the requirement for attacker privileges to modify the library and user interaction limits the scope and ease of exploitation. Organizations relying on Audiobookshelf for self-hosted media streaming may face risks of unauthorized access and data compromise, particularly in environments with multiple users having library modification rights. The vulnerability could be exploited to undermine user trust and privacy, and in some cases, lead to lateral movement if the compromised device is part of a larger network.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade Audiobookshelf to version 2.12.0 or later and update the mobile application to version 0.12.0-beta or newer. Restrict library modification privileges strictly to trusted users to reduce the risk of malicious metadata injection. Implement input validation and sanitization on all user-supplied metadata fields to prevent injection of executable scripts. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the web interface and mobile WebViews. Monitor logs and user activity for unusual modifications to library metadata or unexpected user behavior. Educate users about the risks of interacting with untrusted content within the app. Consider isolating the Audiobookshelf server within a segmented network zone to limit potential lateral movement in case of compromise. Regularly review and audit user permissions and update the application promptly when security patches are released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-25T03:24:57.793Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699fabd8b7ef31ef0b7dea2c

Added to database: 2/26/2026, 2:11:36 AM

Last enriched: 2/26/2026, 2:28:22 AM

Last updated: 2/26/2026, 11:30:02 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats