Skip to main content

CVE-2025-48104: CWE-352 Cross-Site Request Forgery (CSRF) in ericzane Floating Window Music Player

High
VulnerabilityCVE-2025-48104cvecve-2025-48104cwe-352
Published: Fri Sep 05 2025 (09/05/2025, 16:15:42 UTC)
Source: CVE Database V5
Vendor/Project: ericzane
Product: Floating Window Music Player

Description

Cross-Site Request Forgery (CSRF) vulnerability in ericzane Floating Window Music Player allows Stored XSS. This issue affects Floating Window Music Player: from n/a through 3.4.2.

AI-Powered Analysis

AILast updated: 09/05/2025, 16:20:51 UTC

Technical Analysis

CVE-2025-48104 is a high-severity vulnerability classified as CWE-352, indicating a Cross-Site Request Forgery (CSRF) issue in the ericzane Floating Window Music Player, specifically in versions up to 3.4.2. The vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent. The CSRF flaw in this context enables Stored Cross-Site Scripting (XSS), which means that malicious scripts can be injected and persistently stored within the application, potentially executed whenever a user interacts with the affected component. The CVSS score of 7.1 reflects a high impact with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability at a low to moderate level (C:L/I:L/A:L). The absence of patches or known exploits in the wild suggests that the vulnerability is newly disclosed and unmitigated. The vulnerability arises because the application does not properly validate the origin of requests, allowing attackers to craft malicious web pages that, when visited by authenticated users, execute unauthorized commands and inject persistent malicious scripts. This can lead to session hijacking, data theft, or manipulation of user settings within the music player application.

Potential Impact

For European organizations, the impact of this vulnerability depends on the adoption of the ericzane Floating Window Music Player within their environments. If used in corporate or public-facing systems, the CSRF leading to Stored XSS can compromise user accounts, leak sensitive information, or allow attackers to manipulate user data or settings. This can result in reputational damage, data breaches, and potential compliance violations under GDPR if personal data is exposed. The persistent nature of the XSS increases the risk as multiple users can be affected over time. Additionally, attackers could leverage this vulnerability as a pivot point for broader network compromise if the music player is integrated with other internal systems or user authentication mechanisms. The requirement for user interaction means phishing or social engineering campaigns could be used to exploit this vulnerability, increasing the threat surface. European organizations with web-facing portals or intranet sites using this software are particularly at risk.

Mitigation Recommendations

1. Immediate mitigation should include disabling or restricting access to the ericzane Floating Window Music Player until a vendor patch is available. 2. Implement strict CSRF protections such as anti-CSRF tokens and validate the Origin and Referer headers on all state-changing requests within the application. 3. Conduct thorough input validation and output encoding to prevent Stored XSS payloads from being injected or executed. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. 5. Educate users about phishing risks and encourage cautious behavior when interacting with unsolicited links or web pages. 6. Monitor logs for unusual activities related to the music player, such as unexpected POST requests or script injections. 7. If possible, isolate the music player application in a sandboxed environment to limit the impact of potential exploitation. 8. Engage with the vendor for timely patch releases and apply updates as soon as they become available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-15T17:54:35.012Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bb0d9de11b59d9ac04ed3c

Added to database: 9/5/2025, 4:19:41 PM

Last enriched: 9/5/2025, 4:20:51 PM

Last updated: 9/5/2025, 8:04:45 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats