CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Lifecycle Timeline
3DescriptionNVD
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup Universal Video Player allows Reflected XSS. This issue affects Universal Video Player: from n/a through 3.8.3.
AnalysisAI
Reflected Cross-Site Scripting (XSS) vulnerability in LambertGroup Universal Video Player versions up to 3.8.3 that allows unauthenticated attackers to inject arbitrary JavaScript code into web pages viewed by victims. The vulnerability has a CVSS score of 7.1 (High) and affects the popular video player component across multiple web applications. While no public exploit code or KEV listing is indicated in available intelligence, the low attack complexity and user interaction requirement present moderate real-world risk to deployed instances.
Technical ContextAI
The vulnerability stems from CWE-79 (Improper Neutralization of Input During Web Page Generation), a classic Reflected XSS flaw where user-supplied input is not properly sanitized or encoded before being rendered in HTML context. LambertGroup Universal Video Player likely processes URL parameters or form inputs related to video playback (such as video source URLs, player configuration, or metadata parameters) without adequate input validation or output encoding. The 'Reflected' classification indicates the malicious payload is embedded in a URL or request that reflects back through the application to the user's browser, rather than being stored server-side. CPE identifier would typically be: cpe:2.3:a:lambertgroup:universal_video_player:*:*:*:*:*:*:*:* (versions <=3.8.3). This affects any web application embedding this player component.
RemediationAI
Upgrade LambertGroup Universal Video Player to version 3.8.4 or later (assumed patched version; verify with vendor). Check vendor advisory at https://lambertgroup.com/security/ or relevant support channels for confirmed patch availability.; priority: Critical Workaround (Temporary): Implement Web Application Firewall (WAF) rules to detect and block XSS payloads in requests to pages serving the Universal Video Player (e.g., block requests containing script tags, event handlers, or common XSS encodings in URL parameters). Workaround (Temporary): Apply Content Security Policy (CSP) headers with strict directives (e.g., script-src 'self'; object-src 'none') to limit the scope of injected JavaScript, though this does not prevent the vulnerability itself. Detection: Monitor web server and CDN logs for unusual URL patterns targeting video player parameters; search for encoded XSS payloads (%3Cscript, <, etc.) in referrer and query string logs. Configuration: Ensure the player is configured with strict input validation on all URL parameters and form inputs. Validate against a whitelist of expected values rather than blacklisting known attack patterns.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17505