CVE-2025-48104: CWE-352 Cross-Site Request Forgery (CSRF) in ericzane Floating Window Music Player
Cross-Site Request Forgery (CSRF) vulnerability in ericzane Floating Window Music Player allows Stored XSS. This issue affects Floating Window Music Player: from n/a through 3.4.2.
AI Analysis
Technical Summary
CVE-2025-48104 is a high-severity vulnerability classified as CWE-352, indicating a Cross-Site Request Forgery (CSRF) issue in the ericzane Floating Window Music Player, specifically in versions up to 3.4.2. The vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent. The CSRF flaw in this context enables Stored Cross-Site Scripting (XSS), which means that malicious scripts can be injected and persistently stored within the application, potentially executed whenever a user interacts with the affected component. The CVSS score of 7.1 reflects a high impact with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability at a low to moderate level (C:L/I:L/A:L). The absence of patches or known exploits in the wild suggests that the vulnerability is newly disclosed and unmitigated. The vulnerability arises because the application does not properly validate the origin of requests, allowing attackers to craft malicious web pages that, when visited by authenticated users, execute unauthorized commands and inject persistent malicious scripts. This can lead to session hijacking, data theft, or manipulation of user settings within the music player application.
Potential Impact
For European organizations, the impact of this vulnerability depends on the adoption of the ericzane Floating Window Music Player within their environments. If used in corporate or public-facing systems, the CSRF leading to Stored XSS can compromise user accounts, leak sensitive information, or allow attackers to manipulate user data or settings. This can result in reputational damage, data breaches, and potential compliance violations under GDPR if personal data is exposed. The persistent nature of the XSS increases the risk as multiple users can be affected over time. Additionally, attackers could leverage this vulnerability as a pivot point for broader network compromise if the music player is integrated with other internal systems or user authentication mechanisms. The requirement for user interaction means phishing or social engineering campaigns could be used to exploit this vulnerability, increasing the threat surface. European organizations with web-facing portals or intranet sites using this software are particularly at risk.
Mitigation Recommendations
1. Immediate mitigation should include disabling or restricting access to the ericzane Floating Window Music Player until a vendor patch is available. 2. Implement strict CSRF protections such as anti-CSRF tokens and validate the Origin and Referer headers on all state-changing requests within the application. 3. Conduct thorough input validation and output encoding to prevent Stored XSS payloads from being injected or executed. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. 5. Educate users about phishing risks and encourage cautious behavior when interacting with unsolicited links or web pages. 6. Monitor logs for unusual activities related to the music player, such as unexpected POST requests or script injections. 7. If possible, isolate the music player application in a sandboxed environment to limit the impact of potential exploitation. 8. Engage with the vendor for timely patch releases and apply updates as soon as they become available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-48104: CWE-352 Cross-Site Request Forgery (CSRF) in ericzane Floating Window Music Player
Description
Cross-Site Request Forgery (CSRF) vulnerability in ericzane Floating Window Music Player allows Stored XSS. This issue affects Floating Window Music Player: from n/a through 3.4.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-48104 is a high-severity vulnerability classified as CWE-352, indicating a Cross-Site Request Forgery (CSRF) issue in the ericzane Floating Window Music Player, specifically in versions up to 3.4.2. The vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent. The CSRF flaw in this context enables Stored Cross-Site Scripting (XSS), which means that malicious scripts can be injected and persistently stored within the application, potentially executed whenever a user interacts with the affected component. The CVSS score of 7.1 reflects a high impact with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability at a low to moderate level (C:L/I:L/A:L). The absence of patches or known exploits in the wild suggests that the vulnerability is newly disclosed and unmitigated. The vulnerability arises because the application does not properly validate the origin of requests, allowing attackers to craft malicious web pages that, when visited by authenticated users, execute unauthorized commands and inject persistent malicious scripts. This can lead to session hijacking, data theft, or manipulation of user settings within the music player application.
Potential Impact
For European organizations, the impact of this vulnerability depends on the adoption of the ericzane Floating Window Music Player within their environments. If used in corporate or public-facing systems, the CSRF leading to Stored XSS can compromise user accounts, leak sensitive information, or allow attackers to manipulate user data or settings. This can result in reputational damage, data breaches, and potential compliance violations under GDPR if personal data is exposed. The persistent nature of the XSS increases the risk as multiple users can be affected over time. Additionally, attackers could leverage this vulnerability as a pivot point for broader network compromise if the music player is integrated with other internal systems or user authentication mechanisms. The requirement for user interaction means phishing or social engineering campaigns could be used to exploit this vulnerability, increasing the threat surface. European organizations with web-facing portals or intranet sites using this software are particularly at risk.
Mitigation Recommendations
1. Immediate mitigation should include disabling or restricting access to the ericzane Floating Window Music Player until a vendor patch is available. 2. Implement strict CSRF protections such as anti-CSRF tokens and validate the Origin and Referer headers on all state-changing requests within the application. 3. Conduct thorough input validation and output encoding to prevent Stored XSS payloads from being injected or executed. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. 5. Educate users about phishing risks and encourage cautious behavior when interacting with unsolicited links or web pages. 6. Monitor logs for unusual activities related to the music player, such as unexpected POST requests or script injections. 7. If possible, isolate the music player application in a sandboxed environment to limit the impact of potential exploitation. 8. Engage with the vendor for timely patch releases and apply updates as soon as they become available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-15T17:54:35.012Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bb0d9de11b59d9ac04ed3c
Added to database: 9/5/2025, 4:19:41 PM
Last enriched: 9/5/2025, 4:20:51 PM
Last updated: 9/5/2025, 8:04:45 PM
Views: 3
Related Threats
CVE-2025-58373: CWE-59: Improper Link Resolution Before File Access ('Link Following') in RooCodeInc Roo-Code
MediumCVE-2025-58371: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in RooCodeInc Roo-Code
CriticalCVE-2025-58372: CWE-732: Incorrect Permission Assignment for Critical Resource in RooCodeInc Roo-Code
HighCVE-2025-58370: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in RooCodeInc Roo-Code
HighCVE-2025-58369: CWE-400: Uncontrolled Resource Consumption in typelevel fs2
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.