Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48104: CWE-352 Cross-Site Request Forgery (CSRF) in ericzane Floating Window Music Player

0
High
VulnerabilityCVE-2025-48104cvecve-2025-48104cwe-352
Published: Fri Sep 05 2025 (09/05/2025, 16:15:42 UTC)
Source: CVE Database V5
Vendor/Project: ericzane
Product: Floating Window Music Player

Description

Cross-Site Request Forgery (CSRF) vulnerability in ericzane Floating Window Music Player allows Stored XSS. This issue affects Floating Window Music Player: from n/a through 3.4.2.

AI-Powered Analysis

AILast updated: 09/12/2025, 23:51:46 UTC

Technical Analysis

CVE-2025-48104 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability identified in the ericzane Floating Window Music Player, specifically affecting versions up to 3.4.2. The vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent, leveraging the CSRF weakness. This flaw can lead to Stored Cross-Site Scripting (XSS) attacks, where malicious scripts are permanently stored within the application and executed in the context of other users' browsers. The CVSS 3.1 base score of 7.1 reflects a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L). The vulnerability arises because the application does not properly validate or protect state-changing requests against CSRF, allowing attackers to craft malicious web pages or links that, when visited by an authenticated user, execute unintended commands. The resulting Stored XSS can be used to steal session tokens, perform actions on behalf of users, or spread malware. No patches or exploits in the wild are currently reported, but the vulnerability's presence in a widely used music player component could lead to significant exploitation if left unmitigated.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those using the ericzane Floating Window Music Player within their internal or customer-facing environments. The CSRF leading to Stored XSS can compromise user accounts, leak sensitive information, and allow attackers to manipulate user sessions or inject malicious content. This can result in data breaches, reputational damage, and potential regulatory penalties under GDPR if personal data is exposed. The vulnerability's ability to affect confidentiality, integrity, and availability, even at a limited level, means that attackers could disrupt business operations or gain footholds for further attacks. Organizations relying on this software for media playback or integration in web portals should be particularly cautious, as attackers could exploit this vulnerability to target employees or customers, potentially leading to lateral movement within networks or phishing campaigns.

Mitigation Recommendations

Specific mitigation steps include: 1) Immediate review and restriction of the ericzane Floating Window Music Player usage within organizational environments, especially in sensitive or high-privilege contexts. 2) Implementing robust anti-CSRF tokens and validation mechanisms in all state-changing requests within the application to prevent unauthorized command execution. 3) Employ Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting script execution sources. 4) Conduct thorough input validation and output encoding to prevent injection of malicious scripts. 5) Monitor web traffic and logs for unusual requests indicative of CSRF or XSS attempts. 6) Educate users about the risks of clicking on unsolicited links or visiting untrusted websites while authenticated. 7) If possible, isolate or sandbox the music player component to limit the scope of any compromise. 8) Engage with the vendor or community for patches or updates, and apply them promptly once available. 9) Consider deploying Web Application Firewalls (WAF) with rules targeting CSRF and XSS attack patterns to provide an additional layer of defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-15T17:54:35.012Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bb0d9de11b59d9ac04ed3c

Added to database: 9/5/2025, 4:19:41 PM

Last enriched: 9/12/2025, 11:51:46 PM

Last updated: 10/18/2025, 5:44:39 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats