CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Lifecycle Timeline
3DescriptionNVD
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in _CreativeMedia_ Elite Video Player allows Stored XSS. This issue affects Elite Video Player: from n/a through 10.0.5.
AnalysisAI
Stored Cross-Site Scripting (XSS) vulnerability in CreativeMedia Elite Video Player versions up to 10.0.5 that allows unauthenticated attackers to inject and persist malicious scripts through the web page generation process. An attacker can craft a malicious input that gets stored in the application and executed in the browsers of other users who view the affected page, potentially leading to session hijacking, credential theft, or malware distribution. The vulnerability requires user interaction (UI:R) but has a network attack vector with no authentication required, making it a moderate-to-high priority threat depending on deployment context.
Technical ContextAI
This vulnerability stems from improper input sanitization and output encoding during dynamic HTML page generation, classified under CWE-79 (Improper Neutralization of Input During Web Page Generation). The Elite Video Player likely constructs HTML content dynamically using user-supplied input (such as video titles, descriptions, metadata, or configuration parameters) without adequately neutralizing special characters or encoding them for the HTML context. This allows attackers to break out of intended data contexts and inject arbitrary JavaScript code. The 'Stored' nature indicates the malicious payload persists in backend storage (database, files, or cache), making it more dangerous than reflected XSS as it affects all subsequent viewers. The vulnerability affects CreativeMedia Elite Video Player CPE: cpe:2.3:a:creativemedia:elite_video_player:*:*:*:*:*:*:*:* with versions from an unspecified baseline through 10.0.5.
RemediationAI
Immediate actions: (1) Identify all instances of CreativeMedia Elite Video Player running version 10.0.5 or earlier in your environment; (2) Upgrade to a patched version beyond 10.0.5 as soon as available from CreativeMedia (contact vendor or check security advisories at creativemedia.com or vendor security portal); (3) If immediate patching is not possible, implement input validation and output encoding mitigations: sanitize all user-supplied input using a whitelist-based approach, encode all dynamic content for HTML context using appropriate encoding functions (e.g., HTML entity encoding), and apply Content Security Policy (CSP) headers to restrict inline script execution; (4) Implement Web Application Firewall (WAF) rules to detect and block common XSS payloads in requests; (5) Monitor application logs for suspicious input patterns or unusual script injection attempts; (6) Review stored data for any evidence of injected malicious scripts and remediate compromised records. Consult the vendor's security advisory for specific patch version numbers and timeline.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18548