Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-53875: Cleartext Transmission of Sensitive Information in Gomlab GOM Player

0
High
VulnerabilityCVE-2023-53875cvecve-2023-53875
Published: Mon Dec 15 2025 (12/15/2025, 20:28:16 UTC)
Source: CVE Database V5
Vendor/Project: Gomlab
Product: GOM Player

Description

CVE-2023-53875 is a high-severity remote code execution vulnerability in Gomlab GOM Player version 2. 3. 90. 5360. It exploits the Internet Explorer component within the player, allowing attackers to execute arbitrary code via DNS spoofing combined with malicious URL shortcuts and WebDAV techniques. This can lead to a reverse shell with SMB server interaction, enabling attackers to gain control over affected systems. The vulnerability requires no privileges but does require user interaction. No known exploits are currently reported in the wild. European organizations using this version of GOM Player are at risk, especially those with high exposure to multimedia software and legacy Internet Explorer components. Mitigation involves updating the software once patches are available, restricting network access to SMB services, and educating users about suspicious URL shortcuts.

AI-Powered Analysis

AILast updated: 12/22/2025, 21:50:36 UTC

Technical Analysis

CVE-2023-53875 is a remote code execution vulnerability identified in Gomlab's GOM Player version 2.3.90.5360. The flaw resides in the integration of the Internet Explorer component within the player, which can be exploited through DNS spoofing attacks. Attackers can craft malicious URL shortcuts that, when opened by a user, redirect the victim to attacker-controlled resources using WebDAV techniques. This redirection facilitates the execution of a reverse shell that interacts with SMB servers, allowing attackers to execute arbitrary code remotely on the victim's machine. The vulnerability does not require any prior authentication or privileges but does require user interaction to trigger the malicious URL shortcut. The attack vector leverages network-level manipulation (DNS spoofing) combined with client-side exploitation, making it a potent threat in environments where users access untrusted networks or maliciously crafted links. Although no exploits are currently reported in the wild, the complexity of the attack and the reliance on legacy Internet Explorer components embedded in GOM Player increase the risk profile. The CVSS 4.0 score of 7.5 indicates a high severity, primarily due to the potential impact on confidentiality, integrity, and availability, as well as the remote and unauthenticated nature of the attack.

Potential Impact

For European organizations, this vulnerability poses a significant risk of remote system compromise, particularly in environments where GOM Player is widely used for multimedia playback. Successful exploitation can lead to unauthorized access, data exfiltration, lateral movement within networks via SMB interactions, and potential deployment of further malware or ransomware. The reliance on DNS spoofing means that organizations with users frequently connecting to untrusted or public networks are at higher risk. Additionally, the use of legacy Internet Explorer components increases exposure, especially in enterprises with legacy software dependencies. The compromise of endpoints can disrupt business operations, lead to data breaches, and damage organizational reputation. Given the high severity and remote exploitation capability, critical infrastructure sectors, media companies, and enterprises with large multimedia user bases in Europe should be particularly vigilant.

Mitigation Recommendations

1. Immediately audit and inventory all systems running GOM Player version 2.3.90.5360 and restrict or disable its use until a patch is available. 2. Monitor network traffic for unusual DNS activity and implement DNS security measures such as DNSSEC to mitigate spoofing risks. 3. Restrict SMB protocol access on endpoints and network segments to only trusted devices and networks, using firewall rules and network segmentation. 4. Educate users to avoid opening suspicious URL shortcuts or links, especially those received from untrusted sources or over unsecured networks. 5. Employ endpoint detection and response (EDR) solutions to detect anomalous behaviors related to reverse shell activity and SMB interactions. 6. Once available, apply vendor patches promptly and verify the update integrity. 7. Consider disabling or isolating legacy Internet Explorer components embedded within applications if feasible. 8. Conduct regular vulnerability scanning and penetration testing focused on multimedia applications and legacy components.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-13T14:25:04.999Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69407360d9bcdf3f3d00c3c4

Added to database: 12/15/2025, 8:45:20 PM

Last enriched: 12/22/2025, 9:50:36 PM

Last updated: 2/5/2026, 9:05:03 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats