CrowdSec
6/10CrowdSec Score

AVideo - XSS (CVE-2023-48728)

Published on10-01-2024
First seen on26-03-2025
CVSS 9.6/10WWBN - AVideo

28Exploiting IPs reported

A cross-site scripting (xss) vulnerability exists in the functiongetOpenGraph videoName functionality of WWBN AVideo.

CrowdSec analysis

CVE-2023-48728 is a high-severity cross-site scripting vulnerability affecting the functiongetOpenGraph feature of WWBN AVideo, specifically in the handling of video names. This flaw can allow attackers to inject malicious scripts, potentially leading to the execution of arbitrary code in the context of vulnerable users.

CrowdSec has been tracking this vulnerability and its exploits since 26th of March 2025.

Insights from the CrowdSec network reveal that the attackers trying to exploit CVE-2023-48728 are composed of a fairly even mix of opportunistic and targeted actors. Some attackers employ preliminary reconnaissance, while others use indiscriminate scanning. Telemetry from the CrowdSec network also shows that exploitation activity for CVE-2023-48728 remains steady week-over-week. Attack volumes are consistent with long-term trends, indicating sustained interest from threat actors. CVE-2023-48728 continues to be an active part of the threat landscape and will likely remain this way for the forseeable future.

Attack activity typically involves requests to URLs containing /objects/functiongetopengraph.php.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.