CVE-2025-50128

9.6 CRITICAL

📋 TL;DR

A stored cross-site scripting vulnerability in WWBN AVideo allows attackers to inject malicious JavaScript via the videoNotFound 404ErrorMsg parameter. When users visit a specially crafted webpage, arbitrary code executes in their browser context. This affects WWBN AVideo 14.4 and development versions.

💻 Affected Systems

Products:
  • WWBN AVideo
Versions: 14.4 and dev master commit 8a8954ff
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Any installation using the vulnerable videoNotFound functionality is affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, redirect users to malicious sites, perform actions on behalf of authenticated users, or install malware via drive-by downloads.

🟠

Likely Case

Session hijacking, credential theft, defacement of pages, or redirection to phishing sites.

🟢

If Mitigated

Limited impact if proper input validation, output encoding, and Content Security Policy are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (visiting malicious page) but no authentication to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

Monitor vendor for patches. Implement input validation and output encoding on the videoNotFound 404ErrorMsg parameter.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add CSP headers to restrict script execution sources

Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to HTTP headers

Input Validation Filter

all

Sanitize videoNotFound parameter input to remove script tags and JavaScript

Implement server-side filtering for <script>, javascript:, and on* attributes

🧯 If You Can't Patch

  • Disable or restrict access to the vulnerable videoNotFound functionality if not essential
  • Implement web application firewall rules to block XSS payloads in the 404ErrorMsg parameter

🔍 How to Verify

Check if Vulnerable:

Test by injecting <script>alert('XSS')</script> into the videoNotFound 404ErrorMsg parameter and checking if it executes

Check Version:

Check AVideo version in admin panel or configuration files

Verify Fix Applied:

Verify that script injection attempts are properly sanitized or blocked and no longer execute

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with script tags or JavaScript in videoNotFound parameter
  • Unusual 404 error patterns

Network Indicators:

  • HTTP traffic containing malicious script payloads in URL parameters

SIEM Query:

source="web_logs" AND (uri="*videoNotFound*" AND (uri="*<script>*" OR uri="*javascript:*"))

🔗 References

📤 Share & Export