Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47807: n/a

0
Medium
VulnerabilityCVE-2025-47807cvecve-2025-47807
Published: Thu Aug 07 2025 (08/07/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

In GStreamer through 1.26.1, the subparse plugin's subrip_unescape_formatting function may dereference a NULL pointer while parsing a subtitle file, leading to a crash.

AI-Powered Analysis

AILast updated: 08/15/2025, 01:06:02 UTC

Technical Analysis

CVE-2025-47807 is a medium-severity vulnerability affecting GStreamer, an open-source multimedia framework widely used for handling audio and video processing. The flaw exists in the subparse plugin, specifically within the subrip_unescape_formatting function, which is responsible for parsing subtitle files in the SubRip (.srt) format. When processing a crafted subtitle file, this function may dereference a NULL pointer, leading to an application crash (denial of service). The vulnerability is classified under CWE-476 (NULL Pointer Dereference), indicating that the software does not properly check for NULL pointers before dereferencing them. The CVSS v3.1 base score is 5.5, reflecting a medium severity level. The vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H indicates that the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), and user interaction (UI:R). The impact is limited to availability, with no confidentiality or integrity loss. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects GStreamer versions through 1.26.1, but exact affected versions are not specified. The issue could be triggered by opening or processing a malicious subtitle file, causing the media player or any application using GStreamer to crash, potentially disrupting multimedia services or user experience.

Potential Impact

For European organizations, the impact of CVE-2025-47807 primarily involves availability disruption of multimedia applications relying on GStreamer for subtitle rendering. This could affect media players, streaming platforms, video conferencing tools, or any custom multimedia solutions using the vulnerable subparse plugin. While the vulnerability does not lead to data breaches or code execution, denial of service conditions could interrupt business operations, especially in sectors dependent on real-time media processing such as broadcasting, online education, and telecommunication. Organizations providing multimedia content or services may face user dissatisfaction or operational downtime. Additionally, attackers could exploit this vulnerability in targeted attacks by delivering malicious subtitle files via email attachments, downloads, or streaming content, causing crashes on user devices. However, the requirement for local access and user interaction limits remote exploitation potential. The absence of known exploits reduces immediate risk, but the vulnerability should be addressed proactively to prevent future abuse.

Mitigation Recommendations

To mitigate CVE-2025-47807, European organizations should: 1) Identify all systems and applications using GStreamer, particularly those handling subtitle files with the subparse plugin. 2) Monitor official GStreamer project channels for patches or updates addressing this vulnerability and apply them promptly once available. 3) Implement input validation and filtering to block or sanitize suspicious subtitle files, especially from untrusted sources. 4) Employ application-level sandboxing or process isolation for multimedia applications to contain potential crashes and prevent broader system impact. 5) Educate users about the risks of opening subtitle files from unknown or untrusted origins to reduce the likelihood of triggering the vulnerability. 6) Consider using alternative subtitle parsing libraries or disabling subtitle rendering features if not essential. 7) Maintain robust logging and monitoring to detect abnormal application crashes that may indicate exploitation attempts. These measures go beyond generic advice by focusing on the specific context of subtitle file handling and the operational environment of GStreamer-based applications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-10T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6894ff5cad5a09ad00fc6627

Added to database: 8/7/2025, 7:32:44 PM

Last enriched: 8/15/2025, 1:06:02 AM

Last updated: 11/2/2025, 12:09:43 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats