Vulnerability Description
Audiobookshelf is a self-hosted audiobook and podcast server. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 0.12.0-beta of the Audiobookshelf mobile application that allows arbitrary JavaScript execution through malicious library metadata. Attackers with library modification privileges can execute code in victim users' browsers/WebViews, potentially leading to session hijacking, data exfiltration, and unauthorized access to native device APIs. The issue is fixed in audiobookshelf-app version 0.12.0-beta, corresponding to audiobookshelf version 2.12.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Audiobookshelf | Audiobookshelf | < 2.12.0 |
| Audiobookshelf | Audiobookshelf Mobile App | < 0.12.0 |
Related Weaknesses (CWE)
References
- https://github.com/advplyr/audiobookshelf-app/commit/b2c2b625e3cf586562397f4c02ePatch
- https://github.com/advplyr/audiobookshelf/security/advisories/GHSA-2433-p93m-xhhPatchVendor Advisory
FAQ
What is CVE-2026-27973?
CVE-2026-27973 is a vulnerability with a CVSS score of 4.0 (MEDIUM). Audiobookshelf is a self-hosted audiobook and podcast server. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 0.12.0-beta of the Audiobookshelf mobile application that al...
How severe is CVE-2026-27973?
CVE-2026-27973 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-27973?
Check the references section above for vendor advisories and patch information. Affected products include: Audiobookshelf Audiobookshelf, Audiobookshelf Audiobookshelf Mobile App.