Home

Description

WWBN AVideo is an open source video platform. Prior to version 21.0, AVideo allows Markdown in video comments and uses Parsedown (v1.7.4) without Safe Mode enabled. Markdown links are not sufficiently sanitized, allowing `javascript:` URIs to be rendered as clickable links. An authenticated low-privilege attacker can post a malicious comment that injects persistent JavaScript. When another user clicks the link, the attacker can perform actions such as session hijacking, privilege escalation (including admin takeover), and data exfiltration. Version 21.0 contains a fix. As a workaround, validate and block unsafe URI schemes (e.g., `javascript:`) before rendering Markdown, and enable Parsedown Safe Mode.

PUBLISHED Reserved 2026-02-20 | Published 2026-02-24 | Updated 2026-02-24 | Assigner GitHub_M




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 21.0
affected

References

github.com/...AVideo/security/advisories/GHSA-rcqw-6466-3mv7

github.com/...ommit/ade348ed6d28b3797162c3d9e98054fb09ec51d7

github.com/WWBN/AVideo/releases/tag/21.0

cve.org (CVE-2026-27568)

nvd.nist.gov (CVE-2026-27568)

Download JSON