CVE-2026-34739

WWBN AVideo is an open source video platform. In versions 26.0 and prior, the User_Location plugin's testIP.php page reflects the ip request parameter directly into an HTML input element without applying htmlspecialchars() or any other output encoding. This allows an attacker to inject arbitrary HTML and JavaScript via a crafted URL. Although the page is restricted to admin users, AVideo's SameSite=None cookie configuration allows cross-origin exploitation, meaning an attacker can lure an admin to a malicious link that executes JavaScript in their authenticated session. At time of publication, there are no publicly available patches.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

History

01 Apr 2026, 18:42

Type Values Removed Values Added
References () https://github.com/WWBN/AVideo/security/advisories/GHSA-jqrj-chh6-8h78 - () https://github.com/WWBN/AVideo/security/advisories/GHSA-jqrj-chh6-8h78 - Exploit, Vendor Advisory
CPE cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*
First Time Wwbn
Wwbn avideo

01 Apr 2026, 14:16

Type Values Removed Values Added
References () https://github.com/WWBN/AVideo/security/advisories/GHSA-jqrj-chh6-8h78 - () https://github.com/WWBN/AVideo/security/advisories/GHSA-jqrj-chh6-8h78 -

31 Mar 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 21:16

Updated : 2026-04-01 18:42


NVD link : CVE-2026-34739

Mitre link : CVE-2026-34739

CVE.ORG link : CVE-2026-34739


JSON object : View

Products Affected

wwbn

  • avideo
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')