HackerOne community member Patrick Lang (7yr) has reported a reflected XSS vulnerability in the `banner-acl.php` and `channel-acl.php` scripts of Revive Adserver. An attacker can craft a specific URL that includes an HTML payload in a parameter. If a logged in administrator visits the URL, the HTML is sent to the browser and malicious scripts would be executed.
References
| Link | Resource |
|---|---|
| https://hackerone.com/reports/3470970 | Third Party Advisory |
Configurations
History
30 Jan 2026, 20:14
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Aquaplatform
Aquaplatform revive Adserver |
|
| References | () https://hackerone.com/reports/3470970 - Third Party Advisory | |
| CPE | cpe:2.3:a:aquaplatform:revive_adserver:*:*:*:*:*:*:*:* |
21 Jan 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-79 |
20 Jan 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-20 21:16
Updated : 2026-01-30 20:14
NVD link : CVE-2026-21642
Mitre link : CVE-2026-21642
CVE.ORG link : CVE-2026-21642
JSON object : View
Products Affected
aquaplatform
- revive_adserver
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
