CVE-2026-31956

Xibo is an open source digital signage platform with a web content management system and Windows display player software. Prior to version 4.4.1, any authenticated user can manually construct a URL to preview campaigns/regions, and export saved reports belonging to other users. Exploitation of the vulnerability is possible on behalf of an authorized user who has any of the following privileges: Page which shows all Layouts that have been created for the purposes of Layout Management; page which shows all Campaigns that have been created for the purposes of Campaign Management; and page which shows all Reports that have been Saved. Users should upgrade to version 4.4.1 which fixes this issue. Upgrading to a fixed version is necessary to remediate.
Configurations

Configuration 1 (hide)

cpe:2.3:a:xibosignage:xibo:*:*:*:*:*:*:*:*

History

27 Apr 2026, 14:44

Type Values Removed Values Added
First Time Xibosignage
Xibosignage xibo
References () https://github.com/xibosignage/xibo-cms/releases/tag/4.4.1 - () https://github.com/xibosignage/xibo-cms/releases/tag/4.4.1 - Release Notes
References () https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-q6rv-8hhj-3fr8 - () https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-q6rv-8hhj-3fr8 - Vendor Advisory
CPE cpe:2.3:a:xibosignage:xibo:*:*:*:*:*:*:*:*

24 Apr 2026, 01:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-24 01:16

Updated : 2026-04-27 14:44


NVD link : CVE-2026-31956

Mitre link : CVE-2026-31956

CVE.ORG link : CVE-2026-31956


JSON object : View

Products Affected

xibosignage

  • xibo
CWE
CWE-639

Authorization Bypass Through User-Controlled Key