Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-40911 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A Code Injection flaw in WWBN AVideo. πŸ›‘ **Consequences**: Attackers can broadcast arbitrary JavaScript via WebSocket, leading to account takeover, session theft, and privilege escalation.…

Q2Root Cause? (CWE/Flaw)

πŸ” **Root Cause**: CWE-94 (Code Injection). πŸ› **Flaw**: The YPTSocket plugin's WebSocket server forwards uncleaned `msg` or `callback` fields.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Product**: WWBN AVideo. πŸ“… **Affected Versions**: 29.0 and earlier. 🏒 **Vendor**: WWBN. ⚠️ **Component**: Specifically the YPTSocket plugin and WebSocket server logic.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Actions**: Execute arbitrary JavaScript code. πŸ”“ **Privileges**: Bypass authentication (Unauthenticated). πŸ’Ύ **Data**: Steal user sessions, hijack accounts, and perform privileged operations.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: LOW. 🚫 **Auth**: No authentication required (PR:N). πŸ–±οΈ **UI**: No user interaction needed (UI:N). 🌍 **Network**: Remote (AV:N). 🎯 **Complexity**: Low (AC:L). Easy to exploit!

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“‚ **Public Exp**: No specific PoC code provided in the data. πŸ”— **References**: GitHub Advisory (GHSA-gph2-j4c9-vhhr) and Commit fix are available.…

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Check**: Scan for WWBN AVideo instances. πŸ§ͺ **Test**: Look for YPTSocket WebSocket endpoints. πŸ“ **Indicator**: Check if `script.js` contains vulnerable `eval()` calls handling WebSocket messages.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. πŸ“… **Date**: Published 2026-04-21. πŸ”— **Patch**: See GitHub commit `c08694bf6264eb4decceb78c711baee2609b4efd`. πŸ”„ **Action**: Update to the patched version immediately.

Q9What if no patch? (Workaround)

🚧 **Workaround**: Disable the YPTSocket plugin if not needed. πŸ›‘ **Mitigation**: Block WebSocket connections from untrusted sources. 🧹 **Code**: Sanitize `msg` and `callback` fields before forwarding.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: CRITICAL. πŸ“ˆ **CVSS**: 9.8 (High). 🚨 **Priority**: Patch immediately. ⚑ **Reason**: Unauthenticated, remote code execution with severe impact (Account Takeover). Do not delay!