Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13588: Server-Side Request Forgery in lKinderBueno Streamity Xtream IPTV Player

0
Medium
VulnerabilityCVE-2025-13588cvecve-2025-13588
Published: Mon Nov 24 2025 (11/24/2025, 06:32:06 UTC)
Source: CVE Database V5
Vendor/Project: lKinderBueno
Product: Streamity Xtream IPTV Player

Description

A vulnerability was found in lKinderBueno Streamity Xtream IPTV Player up to 2.8. The impacted element is an unknown function of the file public/proxy.php. Performing manipulation results in server-side request forgery. The attack can be initiated remotely. The exploit has been made public and could be used. Upgrading to version 2.8.1 is sufficient to resolve this issue. The patch is named c70bfb8d36b47bfd64c5ec73917e1d9ddb97af92. It is suggested to upgrade the affected component.

AI-Powered Analysis

AILast updated: 12/01/2025, 08:17:57 UTC

Technical Analysis

The vulnerability CVE-2025-13588 affects lKinderBueno Streamity Xtream IPTV Player versions 2.0 through 2.8. It is a server-side request forgery (SSRF) flaw located in an unspecified function within the public/proxy.php file. SSRF vulnerabilities allow attackers to induce the server to make HTTP requests to arbitrary domains or internal network resources, potentially bypassing firewall restrictions and accessing sensitive internal services. This vulnerability can be exploited remotely without requiring user interaction or authentication, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability does not involve scope changes or security requirements. Although no active exploits are known in the wild, the exploit code has been publicly disclosed, raising the risk of future attacks. The vendor has released version 2.8.1 containing a patch (commit c70bfb8d36b47bfd64c5ec73917e1d9ddb97af92) that addresses the SSRF by presumably validating or restricting the proxy.php request parameters. Organizations running affected versions should upgrade immediately to prevent exploitation.

Potential Impact

For European organizations, this SSRF vulnerability poses risks primarily related to unauthorized internal network reconnaissance and potential data leakage. IPTV players are often deployed in media companies, ISPs, and enterprises providing streaming services. Exploitation could allow attackers to pivot from the exposed IPTV player to internal services, such as databases, metadata servers, or management consoles, which may not be directly accessible from the internet. This could lead to exposure of sensitive customer data, intellectual property, or internal infrastructure details. Additionally, SSRF can be leveraged as a stepping stone for further attacks, including server compromise or lateral movement. The medium severity reflects that while the vulnerability is exploitable remotely without authentication, the impact is partial and limited by the specific internal network architecture. However, organizations with poorly segmented networks or critical IPTV infrastructure could face significant operational disruptions or data breaches if exploited.

Mitigation Recommendations

1. Immediately upgrade all instances of lKinderBueno Streamity Xtream IPTV Player to version 2.8.1 or later, which contains the official patch for CVE-2025-13588. 2. Implement strict network segmentation and firewall rules to limit the IPTV player's ability to access internal services unnecessarily. 3. Monitor network traffic from IPTV servers for unusual outbound requests, especially to internal IP ranges or unexpected external domains. 4. Conduct regular security audits and penetration tests focusing on SSRF and proxy-related vulnerabilities in IPTV and streaming infrastructure. 5. If upgrading is temporarily not possible, consider disabling or restricting access to the vulnerable proxy.php endpoint via web application firewalls or reverse proxies. 6. Educate IT and security teams about SSRF risks and ensure incident response plans include SSRF exploitation scenarios. 7. Maintain up-to-date asset inventories to quickly identify affected IPTV player versions in the environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-23T14:30:22.838Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69240640272f5312cdb48a60

Added to database: 11/24/2025, 7:16:16 AM

Last enriched: 12/1/2025, 8:17:57 AM

Last updated: 1/8/2026, 2:28:07 PM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats