← Back to CVEs
CVE-2026-34739
MEDIUM6.1
Description
WWBN AVideo is an open source video platform. In versions 26.0 and prior, the User_Location plugin's testIP.php page reflects the ip request parameter directly into an HTML input element without applying htmlspecialchars() or any other output encoding. This allows an attacker to inject arbitrary HTML and JavaScript via a crafted URL. Although the page is restricted to admin users, AVideo's SameSite=None cookie configuration allows cross-origin exploitation, meaning an attacker can lure an admin to a malicious link that executes JavaScript in their authenticated session. At time of publication, there are no publicly available patches.
CVE Details
CVSS v3.1 Score6.1
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published3/31/2026
Last Modified4/1/2026
Sourcenvd
Honeypot Sightings0
Affected Products
wwbn:avideo
Weaknesses (CWE)
CWE-79
References
https://github.com/WWBN/AVideo/security/advisories/GHSA-jqrj-chh6-8h78(security-advisories@github.com)
https://github.com/WWBN/AVideo/security/advisories/GHSA-jqrj-chh6-8h78(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.