CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Lifecycle Timeline
3DescriptionNVD
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup Revolution Video Player allows Reflected XSS. This issue affects Revolution Video Player: from n/a through 2.9.2.
AnalysisAI
Reflected Cross-Site Scripting (XSS) vulnerability in LambertGroup Revolution Video Player versions up to 2.9.2 that allows unauthenticated attackers to inject malicious scripts into web pages viewed by victims. The vulnerability has a CVSS score of 7.1 (High) with network-based attack vector requiring user interaction, enabling attackers to steal session tokens, redirect users, or perform actions on behalf of victims. Without confirmation of active exploitation (KEV status) or public proof-of-concept, this represents a moderate real-world threat dependent on deployment prevalence and user interaction feasibility.
Technical ContextAI
This vulnerability stems from improper input sanitization during HTML generation in the Revolution Video Player web interface, classified as CWE-79 (Improper Neutralization of Input During Web Page Generation). The player fails to properly encode or filter user-supplied input parameters before reflecting them back in HTTP responses, allowing attackers to break out of HTML context and inject arbitrary JavaScript code. The affected component likely handles video player configuration, URL parameters, or embed code generation without implementing Content Security Policy (CSP), output encoding, or input validation. The vulnerability affects Revolution Video Player versions from an unspecified baseline through 2.9.2, suggesting the issue may have existed in early versions or was introduced during active development.
RemediationAI
Immediate action: Upgrade LambertGroup Revolution Video Player to version 2.9.3 or later (assuming patched version exists post-2.9.2; verify with vendor). Interim mitigations pending patch deployment: (1) Implement strict Content Security Policy (CSP) headers to prevent inline script execution (script-src 'self'), (2) Apply URL input validation and sanitization at application layer to reject or encode special characters in player parameters, (3) Use HTTP-only and Secure flags on session cookies to limit token theft impact, (4) Deploy Web Application Firewall (WAF) rules to detect and block reflected XSS patterns in Revolution Video Player URLs, (5) Conduct security awareness training on phishing and suspicious link recognition to reduce user interaction risk. Contact LambertGroup directly for patch availability and security advisories if not publicly available.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17495