Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34396: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in WWBN AVideo

0
Medium
VulnerabilityCVE-2026-34396cvecve-2026-34396cwe-79
Published: Tue Mar 31 2026 (03/31/2026, 20:40:43 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-34396 is a cross-site scripting (XSS) vulnerability in WWBN AVideo versions 26. 0 and earlier. The vulnerability arises because the admin panel fails to properly encode plugin configuration values before rendering them in HTML forms, allowing injection of arbitrary JavaScript. An attacker with the ability to set plugin configuration values—either by compromising an admin account or exploiting a CSRF vulnerability—can execute malicious scripts when an administrator views the plugin configuration page. This flaw affects the jsonToFormElements() function in admin/functions. php, which directly interpolates user-controlled input into HTML elements without htmlspecialchars() or equivalent encoding. No patches are available at the time of disclosure. The CVSS score is 6. 1 (medium severity), reflecting network attack vector, low complexity, no privileges required, but requiring user interaction and impacting confidentiality and integrity. There are no known exploits in the wild yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 21:26:26 UTC

Technical Analysis

CVE-2026-34396 is a stored cross-site scripting vulnerability affecting WWBN AVideo, an open-source video platform, in versions 26.0 and prior. The vulnerability exists because the admin panel's plugin configuration interface fails to properly sanitize or encode user-controlled input before embedding it into HTML form elements. Specifically, the jsonToFormElements() function in admin/functions.php directly inserts plugin configuration values into textarea contents, option elements, and input attributes without applying htmlspecialchars() or any other output encoding. This improper neutralization of input (CWE-79) allows an attacker who can set or manipulate plugin configuration values—either by having administrative access or by chaining with a cross-site request forgery (CSRF) attack against admin/save.json.php—to inject arbitrary JavaScript code. When any administrator subsequently visits the affected plugin configuration page, the injected script executes in their browser context, potentially leading to session hijacking, credential theft, or further administrative compromise. The vulnerability is exploitable remotely over the network without authentication but requires user interaction (an admin visiting the malicious page). The scope is confined to the administrative interface, but the impact includes loss of confidentiality and integrity of administrative sessions and data. At the time of publication, no patches or official fixes have been released, and no public exploits are known. The CVSS 3.1 base score is 6.1, indicating medium severity due to the combination of ease of exploitation and impact on confidentiality and integrity without affecting availability.

Potential Impact

This vulnerability poses a significant risk to organizations using WWBN AVideo, particularly those relying on the administrative interface for plugin management. Successful exploitation can lead to arbitrary JavaScript execution in the context of an administrator’s browser, enabling session hijacking, credential theft, or unauthorized administrative actions. This can result in unauthorized access to sensitive video content, user data, or platform configuration, potentially leading to data breaches or service manipulation. Since the vulnerability can be chained with CSRF attacks, attackers without direct admin credentials might still exploit it, increasing the attack surface. The impact is primarily on confidentiality and integrity, with no direct availability impact. Organizations with multiple administrators or those exposing the admin panel to the internet are at higher risk. The absence of patches means the vulnerability remains exploitable until mitigations are applied, increasing exposure time. Additionally, compromised administrative accounts can be leveraged for further attacks within the organization’s infrastructure.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately restrict access to the AVideo admin panel to trusted networks and users, ideally behind VPNs or IP whitelisting. Implement multi-factor authentication (MFA) for all administrator accounts to reduce the risk of credential compromise. Monitor and audit administrative actions and plugin configurations for unauthorized changes. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the plugin configuration endpoints. Since no official patches are available, consider applying temporary code-level mitigations by modifying the jsonToFormElements() function to properly encode all user-controlled input using htmlspecialchars() or equivalent output encoding functions before rendering in HTML. Educate administrators to avoid clicking on suspicious links or performing plugin configuration changes from untrusted sources to reduce CSRF risks. Regularly back up configuration data to enable recovery if compromise occurs. Stay alert for official patches or updates from WWBN and apply them promptly once released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-27T13:45:29.619Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cc37c1e6bfc5ba1d4189f5

Added to database: 3/31/2026, 9:08:17 PM

Last enriched: 3/31/2026, 9:26:26 PM

Last updated: 4/1/2026, 6:17:08 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses