CVE-2025-48104: CWE-352 Cross-Site Request Forgery (CSRF) in ericzane Floating Window Music Player
Cross-Site Request Forgery (CSRF) vulnerability in ericzane Floating Window Music Player allows Stored XSS. This issue affects Floating Window Music Player: from n/a through 3.4.2.
AI Analysis
Technical Summary
CVE-2025-48104 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability identified in the ericzane Floating Window Music Player, specifically affecting versions up to 3.4.2. The vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent, leveraging the CSRF weakness. This flaw can lead to Stored Cross-Site Scripting (XSS) attacks, where malicious scripts are permanently stored within the application and executed in the context of other users' browsers. The CVSS 3.1 base score of 7.1 reflects a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L). The vulnerability arises because the application does not properly validate or protect state-changing requests against CSRF, allowing attackers to craft malicious web pages or links that, when visited by an authenticated user, execute unintended commands. The resulting Stored XSS can be used to steal session tokens, perform actions on behalf of users, or spread malware. No patches or exploits in the wild are currently reported, but the vulnerability's presence in a widely used music player component could lead to significant exploitation if left unmitigated.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those using the ericzane Floating Window Music Player within their internal or customer-facing environments. The CSRF leading to Stored XSS can compromise user accounts, leak sensitive information, and allow attackers to manipulate user sessions or inject malicious content. This can result in data breaches, reputational damage, and potential regulatory penalties under GDPR if personal data is exposed. The vulnerability's ability to affect confidentiality, integrity, and availability, even at a limited level, means that attackers could disrupt business operations or gain footholds for further attacks. Organizations relying on this software for media playback or integration in web portals should be particularly cautious, as attackers could exploit this vulnerability to target employees or customers, potentially leading to lateral movement within networks or phishing campaigns.
Mitigation Recommendations
Specific mitigation steps include: 1) Immediate review and restriction of the ericzane Floating Window Music Player usage within organizational environments, especially in sensitive or high-privilege contexts. 2) Implementing robust anti-CSRF tokens and validation mechanisms in all state-changing requests within the application to prevent unauthorized command execution. 3) Employ Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting script execution sources. 4) Conduct thorough input validation and output encoding to prevent injection of malicious scripts. 5) Monitor web traffic and logs for unusual requests indicative of CSRF or XSS attempts. 6) Educate users about the risks of clicking on unsolicited links or visiting untrusted websites while authenticated. 7) If possible, isolate or sandbox the music player component to limit the scope of any compromise. 8) Engage with the vendor or community for patches or updates, and apply them promptly once available. 9) Consider deploying Web Application Firewalls (WAF) with rules targeting CSRF and XSS attack patterns to provide an additional layer of defense.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-48104: CWE-352 Cross-Site Request Forgery (CSRF) in ericzane Floating Window Music Player
Description
Cross-Site Request Forgery (CSRF) vulnerability in ericzane Floating Window Music Player allows Stored XSS. This issue affects Floating Window Music Player: from n/a through 3.4.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-48104 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability identified in the ericzane Floating Window Music Player, specifically affecting versions up to 3.4.2. The vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent, leveraging the CSRF weakness. This flaw can lead to Stored Cross-Site Scripting (XSS) attacks, where malicious scripts are permanently stored within the application and executed in the context of other users' browsers. The CVSS 3.1 base score of 7.1 reflects a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. The impact affects confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L). The vulnerability arises because the application does not properly validate or protect state-changing requests against CSRF, allowing attackers to craft malicious web pages or links that, when visited by an authenticated user, execute unintended commands. The resulting Stored XSS can be used to steal session tokens, perform actions on behalf of users, or spread malware. No patches or exploits in the wild are currently reported, but the vulnerability's presence in a widely used music player component could lead to significant exploitation if left unmitigated.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those using the ericzane Floating Window Music Player within their internal or customer-facing environments. The CSRF leading to Stored XSS can compromise user accounts, leak sensitive information, and allow attackers to manipulate user sessions or inject malicious content. This can result in data breaches, reputational damage, and potential regulatory penalties under GDPR if personal data is exposed. The vulnerability's ability to affect confidentiality, integrity, and availability, even at a limited level, means that attackers could disrupt business operations or gain footholds for further attacks. Organizations relying on this software for media playback or integration in web portals should be particularly cautious, as attackers could exploit this vulnerability to target employees or customers, potentially leading to lateral movement within networks or phishing campaigns.
Mitigation Recommendations
Specific mitigation steps include: 1) Immediate review and restriction of the ericzane Floating Window Music Player usage within organizational environments, especially in sensitive or high-privilege contexts. 2) Implementing robust anti-CSRF tokens and validation mechanisms in all state-changing requests within the application to prevent unauthorized command execution. 3) Employ Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting script execution sources. 4) Conduct thorough input validation and output encoding to prevent injection of malicious scripts. 5) Monitor web traffic and logs for unusual requests indicative of CSRF or XSS attempts. 6) Educate users about the risks of clicking on unsolicited links or visiting untrusted websites while authenticated. 7) If possible, isolate or sandbox the music player component to limit the scope of any compromise. 8) Engage with the vendor or community for patches or updates, and apply them promptly once available. 9) Consider deploying Web Application Firewalls (WAF) with rules targeting CSRF and XSS attack patterns to provide an additional layer of defense.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-15T17:54:35.012Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bb0d9de11b59d9ac04ed3c
Added to database: 9/5/2025, 4:19:41 PM
Last enriched: 9/12/2025, 11:51:46 PM
Last updated: 10/18/2025, 5:44:39 PM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-47410: CWE-352 Cross-Site Request Forgery (CSRF) in Apache Software Foundation Apache Geode
UnknownCVE-2025-11926: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdreams Related Posts Lite
MediumCVE-2025-9890: CWE-352 Cross-Site Request Forgery (CSRF) in mndpsingh287 Theme Editor
HighCVE-2025-5555: Stack-based Buffer Overflow in Nixdorf Wincor PORT IO Driver
HighCVE-2025-11256: CWE-285 Improper Authorization in kognetiks Kognetiks Chatbot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.