Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10370: Cross Site Scripting in MiczFlor RPi-Jukebox-RFID

0
Medium
VulnerabilityCVE-2025-10370cvecve-2025-10370
Published: Sat Sep 13 2025 (09/13/2025, 17:02:07 UTC)
Source: CVE Database V5
Vendor/Project: MiczFlor
Product: RPi-Jukebox-RFID

Description

A vulnerability was identified in MiczFlor RPi-Jukebox-RFID up to 2.8.0. This vulnerability affects unknown code of the file /htdocs/userScripts.php. The manipulation of the argument Custom script leads to cross site scripting. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/21/2025, 00:38:14 UTC

Technical Analysis

CVE-2025-10370 is a cross-site scripting (XSS) vulnerability identified in the MiczFlor RPi-Jukebox-RFID software, specifically affecting versions 2.0 through 2.8.0. The vulnerability resides in the /htdocs/userScripts.php file, where the 'Custom script' argument can be manipulated by an attacker to inject malicious scripts. This flaw allows remote attackers to execute arbitrary JavaScript code in the context of the victim's browser without requiring authentication, although user interaction is necessary to trigger the malicious payload. The vulnerability is classified as a reflected or stored XSS, depending on the implementation details of how the input is handled and reflected back to the user. The vendor was notified prior to public disclosure but did not respond or provide a patch, and an exploit is publicly available, increasing the risk of exploitation. The CVSS v4.0 base score is 5.1 (medium severity), reflecting the ease of remote exploitation (no privileges required), but limited impact on confidentiality and availability, with some impact on integrity via script execution. The vulnerability does not affect the core system's availability or confidentiality directly but can be leveraged to perform session hijacking, phishing, or other client-side attacks against users interacting with the affected web interface. Since the product is designed for Raspberry Pi-based jukebox systems with RFID integration, it is likely deployed in niche environments such as hobbyist setups, small businesses, or educational contexts. However, any deployment exposing the web interface to untrusted networks or users is at risk.

Potential Impact

For European organizations using MiczFlor RPi-Jukebox-RFID, this vulnerability poses a moderate risk primarily to the integrity of user sessions and the trustworthiness of the web interface. While the product is specialized and not widely adopted in enterprise environments, small businesses, educational institutions, or hobbyist groups in Europe using this software could face targeted attacks. Exploitation could lead to unauthorized script execution in users' browsers, enabling phishing, credential theft, or unauthorized actions within the jukebox system's web interface. Although the direct impact on critical infrastructure or sensitive data is limited, compromised user sessions could be a stepping stone for further attacks in a networked environment. The lack of vendor response and patch availability increases the window of exposure. European organizations with public-facing or poorly segmented deployments are particularly vulnerable. The medium CVSS score reflects that while the vulnerability is exploitable remotely without authentication, user interaction is required, somewhat limiting automated large-scale exploitation. However, the availability of public exploits raises the likelihood of opportunistic attacks.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Immediately restrict access to the RPi-Jukebox-RFID web interface by network segmentation or firewall rules to trusted users only, preventing exposure to untrusted networks. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the 'Custom script' parameter. 3) Educate users about the risks of interacting with untrusted links or inputs related to the jukebox interface to reduce successful exploitation via social engineering. 4) If possible, disable or limit the use of the 'Custom script' functionality until a vendor patch or community fix is available. 5) Monitor logs for unusual or repeated requests to /htdocs/userScripts.php that may indicate exploitation attempts. 6) Consider deploying reverse proxies or input sanitization layers that can filter out malicious script injections. 7) Engage with the open-source community or vendor channels to track patch releases or mitigations. 8) As a longer-term solution, evaluate alternative software solutions with active maintenance and security support for similar use cases.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-12T14:04:41.831Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c5a6a1e14ebf9f5cc782da

Added to database: 9/13/2025, 5:15:13 PM

Last enriched: 9/21/2025, 12:38:14 AM

Last updated: 10/30/2025, 2:13:49 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats