AVideo has Stored Cross-Site Scripting via Markdown Comment Injection
Description
WWBN AVideo is an open source video platform. Prior to version 21.0, AVideo allows Markdown in video comments and uses Parsedown (v1.7.4) without Safe Mode enabled. Markdown links are not sufficiently sanitized, allowing javascript: URIs to be rendered as clickable links. An authenticated low-privilege attacker can post a malicious comment that injects persistent JavaScript. When another user clicks the link, the attacker can perform actions such as session hijacking, privilege escalation (including admin takeover), and data exfiltration. Version 21.0 contains a fix. As a workaround, validate and block unsafe URI schemes (e.g., javascript:) before rendering Markdown, and enable Parsedown Safe Mode.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | < 21.0 | 21.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-rcqw-6466-3mv7ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-27568ghsaADVISORY
- github.com/WWBN/AVideo/commit/ade348ed6d28b3797162c3d9e98054fb09ec51d7ghsax_refsource_MISCWEB
- github.com/WWBN/AVideo/releases/tag/21.0ghsax_refsource_MISCWEB
- github.com/WWBN/AVideo/security/advisories/GHSA-rcqw-6466-3mv7ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.