HackerOne community member Huynh Pham Thanh Luc (nigh7c0r3) has reported a reflected XSS vulnerability in the afr.php delivery script of Revive Adserver. An attacker can craft a specific URL that includes an HTML payload in a parameter. If a logged in administrator visits the URL, the HTML is sent to the browser and malicious scripts would be executed.
References
| Link | Resource |
|---|---|
| https://hackerone.com/reports/3468169 | Third Party Advisory |
Configurations
History
03 Feb 2026, 21:04
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:aquaplatform:revive_adserver:*:*:*:*:*:*:*:* | |
| First Time |
Aquaplatform revive Adserver
Aquaplatform |
|
| References | () https://hackerone.com/reports/3468169 - Third Party Advisory |
Information
Published : 2026-01-20 21:16
Updated : 2026-02-03 21:04
NVD link : CVE-2026-21664
Mitre link : CVE-2026-21664
CVE.ORG link : CVE-2026-21664
JSON object : View
Products Affected
aquaplatform
- revive_adserver
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
