Skip to main content

CVE-2025-30986: CWE-352 Cross-Site Request Forgery (CSRF) in _CreativeMedia_ Elite Video Player

Medium
VulnerabilityCVE-2025-30986cvecve-2025-30986cwe-352
Published: Fri Jun 06 2025 (06/06/2025, 12:54:04 UTC)
Source: CVE Database V5
Vendor/Project: _CreativeMedia_
Product: Elite Video Player

Description

Cross-Site Request Forgery (CSRF) vulnerability in _CreativeMedia_ Elite Video Player allows Cross Site Request Forgery. This issue affects Elite Video Player: from n/a through 10.0.5.

AI-Powered Analysis

AILast updated: 07/08/2025, 03:00:09 UTC

Technical Analysis

CVE-2025-30986 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the _CreativeMedia_ Elite Video Player, affecting versions up to 10.0.5. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged request to a web application in which the user is currently authenticated. In this case, the Elite Video Player does not sufficiently verify the origin or intent of requests that can alter the state or configuration of the player, enabling an attacker to perform unauthorized actions on behalf of the user. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), such as clicking a malicious link or visiting a crafted webpage. The attack complexity is low (AC:L), meaning no special conditions are needed beyond user interaction. The impact affects integrity and availability (I:L, A:L) but not confidentiality, indicating that attackers can potentially alter player settings or disrupt its functionality but cannot directly access sensitive data. The vulnerability is rated medium severity with a CVSS 3.1 base score of 5.4. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability falls under CWE-352, a common web security weakness related to CSRF attacks. This vulnerability could be leveraged to manipulate video playback behavior, settings, or potentially inject malicious content if the player supports such features, impacting user experience and service reliability.

Potential Impact

For European organizations using the Elite Video Player, this vulnerability could lead to unauthorized changes in video playback or configuration, potentially disrupting digital content delivery or user experience on websites or platforms that embed this player. While it does not directly expose confidential data, the integrity and availability impacts could affect media services, online training platforms, or marketing content delivery, leading to reputational damage or operational disruptions. Organizations relying on this player for critical communications or customer engagement may face service interruptions or manipulation of displayed content. Attackers could exploit this vulnerability to degrade service quality or cause confusion among users, which could be particularly impactful for sectors such as media, education, and e-commerce. Since exploitation requires user interaction, phishing or social engineering campaigns could be used to trigger the attack, increasing risk in environments with less user security awareness.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict anti-CSRF tokens in all state-changing requests handled by the Elite Video Player, ensuring that any request modifying player state is validated against a unique token tied to the user session. Additionally, enforcing same-site cookie attributes and validating the HTTP Referer or Origin headers can help detect and block unauthorized cross-origin requests. Organizations should monitor for updates or patches from _CreativeMedia_ and apply them promptly once available. In the interim, restricting the embedding of the Elite Video Player to trusted domains and educating users to avoid clicking suspicious links can reduce exploitation risk. Web application firewalls (WAFs) can be configured to detect and block anomalous requests targeting the player. Finally, reviewing and minimizing the privileges and capabilities exposed by the player can reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-03-26T09:22:41.972Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6842eddd71f4d251b5c88032

Added to database: 6/6/2025, 1:32:13 PM

Last enriched: 7/8/2025, 3:00:09 AM

Last updated: 8/1/2025, 2:02:22 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats