Vulnerability Description
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `view/forbiddenPage.php` and `view/warningPage.php` templates reflect the `$_REQUEST['unlockPassword']` parameter directly into an HTML `<input>` tag's attributes without any output encoding or sanitization. An attacker can craft a URL that breaks out of the `value` attribute and injects arbitrary HTML attributes including JavaScript event handlers, achieving reflected XSS against any visitor who clicks the link. Commit f154167251c9cf183ce09cd018d07e9352310457 contains a patch.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wwbn | Avideo | <= 26.0 |
Related Weaknesses (CWE)
References
- https://github.com/WWBN/AVideo/commit/f154167251c9cf183ce09cd018d07e9352310457Patch
- https://github.com/WWBN/AVideo/security/advisories/GHSA-7292-w8qp-mhq2ExploitMitigationVendor Advisory
FAQ
What is CVE-2026-33499?
CVE-2026-33499 is a vulnerability with a CVSS score of 6.1 (MEDIUM). WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `view/forbiddenPage.php` and `view/warningPage.php` templates reflect the `$_REQUEST['unlockPassword']` paramete...
How severe is CVE-2026-33499?
CVE-2026-33499 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33499?
Check the references section above for vendor advisories and patch information. Affected products include: Wwbn Avideo.