Xibo Digital Signage Platform Hit with Critical SQL Injection

Xibo Digital Signage Platform Hit with Critical SQL Injection

The National Vulnerability Database has identified CVE-2026-31952, a high-severity SQL injection vulnerability impacting Xibo’s open-source digital signage platform. Versions 1.7 through 4.4.0 of the Xibo CMS are susceptible, allowing authenticated users with specific privileges to access and manipulate database records. This exploit targets API routes used for filtering DataSets, enabling attackers to exfiltrate or alter critical information.

Attackers can leverage this flaw if they possess either the Access to DataSet Feature or Access to the Layout Feature privilege. The CVSS score of 7.6 highlights the significant risk, with the vector indicating network accessibility and low complexity. Defenders must prioritize patching these systems to prevent unauthorized data access and modification, which could lead to operational disruption or data integrity issues.

Xibo has released version 4.4.1 to address this vulnerability. Customers utilizing Xibo Signage’s hosted CMS have been patched if on supported versions. For self-hosted instances, upgrading to the latest version is imperative. Patches are also available for older, out-of-support versions (3.3, 2.3, and 1.8), emphasizing the need for ongoing maintenance even for legacy deployments.

What This Means For You

  • If your organization utilizes Xibo digital signage, immediately verify your CMS version. Upgrade to Xibo 4.4.1 or a patched version if you are running 1.7 through 4.4.0. Authenticated users with specific privileges can exploit this SQL injection to steal or alter data; audit access logs for any unusual activity related to DataSet or Layout features.
🛡️ Am I exposed to this? Get detection rules for CVE-2026-31952 — Splunk, Sentinel, Elastic, QRadar & more

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

CVE-2026-31952 - Xibo CMS SQL Injection in DataSet Filtering

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-31952 SQLi Xibo CMS versions 1.7 through 4.4.0
CVE-2026-31952 SQLi API routes responsible for Filtering DataSets in Xibo CMS
CVE-2026-31952 SQLi Injection via API filter parameter in Xibo CMS
CVE-2026-31952 SQLi Authenticated user with 'Access to DataSet Feature' or 'Access to the Layout Feature' privilege
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 24, 2026 at 03:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-31956 — Xibo is an open source digital signage platform with a web

CVE-2026-31956 — Xibo is an open source digital signage platform with a web content management system and Windows display player software. Prior to version 4.4.1,...

vulnerabilityCVEmedium-severitycwe-639
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs /⚙ 2 Sigma

CVE-2026-31955 — Versions Prior To Server-Side Request Forgery

CVE-2026-31955 — Xibo is an open source digital signage platform with a web content management system and Windows display player software. An authenticated Server-Side Request...

vulnerabilityCVEmedium-severityserver-side-request-forgerycwe-918
/SCW Vulnerability Desk /MEDIUM /4.9 /⚑ 2 IOCs /⚙ 3 Sigma

CVE-2026-31953 — Versions Prior To Cross-Site Scripting (XSS)

CVE-2026-31953 — Xibo is an open source digital signage platform with a web content management system and Windows display player software. A stored Cross-Site Scripting...

vulnerabilityCVEmedium-severitycross-site-scripting-xsscwe-79
/SCW Vulnerability Desk /MEDIUM /6.4 /⚑ 2 IOCs /⚙ 3 Sigma