Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-31953— Xibo CMS has Stored XSS via Notification Body with Zero-Click Execution on Login

CVSS 6.4 · Medium EPSS 0.03% · P7
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-31953

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Xibo CMS has Stored XSS via Notification Body with Zero-Click Execution on Login
Source: NVD (National Vulnerability Database)
Vulnerability Description
Xibo is an open source digital signage platform with a web content management system and Windows display player software. A stored Cross-Site Scripting (XSS) vulnerability in versions prior to 4.4.1 allows an authenticated user with notification creation permissions to inject arbitrary JavaScript into the notification body. When the notification is set as an "interrupt," the payload executes automatically in the browser of any targeted user upon login, requiring zero user interaction. Exploitation of the vulnerability is possible on behalf of an authorized user who has both of the following privileges, which are not granted to non-admins as standard: Access to the Notification Centre to view past notifications, and include "Add Notification" button to allow for the creation of new notifications. Users should upgrade to version 4.4.1 which fixes this issue. Upgrading to a fixed version is necessary to remediate. Users unable to upgrade should revoke such privileges from users they do not trust.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Xibo 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Xibo是Dan Garner个人开发者的一款数字标牌内容管理工具。 Xibo 4.4.1之前版本存在跨站脚本漏洞,该漏洞源于通知正文存储型跨站脚本,可能导致授权用户在目标用户登录时自动执行恶意JavaScript。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
xibosignagexibo-cms < 4.4.1 -

II. Public POCs for CVE-2026-31953

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-31953

登录查看更多情报信息。

Same Patch Batch · xibosignage · 2026-04-24 · 4 CVEs total

CVE-2026-319527.6 HIGHXibo CMS API has SQL Injection via DataSet Filter Parameter
CVE-2026-319554.9 MEDIUMXibo CMS has Authenticated Server-Side Request Forgery (SSRF) in Remote DataSet Functional
CVE-2026-319564.3 MEDIUMXibo CMS has Preview and SavedReport IDOR via disableUserCheck without controller-level au

IV. Related Vulnerabilities

V. Comments for CVE-2026-31953

No comments yet


Leave a comment