WWBN AVideo is an open source video platform. In versions up to and including 26.0, a sanitization order-of-operations flaw in the user profile "about" field allows any registered user to inject arbitrary JavaScript that executes when other users visit their channel page. The `xss_esc()` function entity-encodes input before `strip_specific_tags()` can match dangerous HTML tags, and `html_entity_decode()` on output reverses the encoding, restoring the raw malicious HTML. Commit 7cfdc380dae1e56bbb5de581470d9e9957445df0 contains a patch.
References
| Link | Resource |
|---|---|
| https://github.com/WWBN/AVideo/commit/7cfdc380dae1e56bbb5de581470d9e9957445df0 | Patch |
| https://github.com/WWBN/AVideo/security/advisories/GHSA-ghx5-7jjg-q2j7 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-23 19:16
Updated : 2026-03-25 18:04
NVD link : CVE-2026-33683
Mitre link : CVE-2026-33683
CVE.ORG link : CVE-2026-33683
JSON object : View
Products Affected
wwbn
- avideo
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
