Medium severity5.4NVD Advisory· Published Apr 7, 2026· Updated Apr 22, 2026
CVE-2026-39367
CVE-2026-39367
Description
WWBN AVideo is an open source video platform. In versions 26.0 and prior, AVideo's EPG (Electronic Program Guide) feature parses XML from user-controlled URLs and renders programme titles directly into HTML without any sanitization or escaping. A user with upload permission can set a video's epg_link to a malicious XML file whose <title> elements contain JavaScript. This payload executes in the browser of any unauthenticated visitor to the public EPG page, enabling session hijacking and account takeover.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
wwbn/avideoPackagist | <= 26.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/WWBN/AVideo/commit/e0212add4aad0f1e97758a4b4fdc57df58ce68e8nvdPatchWEB
- github.com/WWBN/AVideo/security/advisories/GHSA-rqp3-gf5h-mrqxnvdThird Party AdvisoryWEB
- github.com/advisories/GHSA-rqp3-gf5h-mrqxghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-39367ghsaADVISORY
News mentions
0No linked articles in our index yet.