CVE-2025-48359: CWE-352 Cross-Site Request Forgery (CSRF) in thaihavnn07 ATT YouTube Widget
Cross-Site Request Forgery (CSRF) vulnerability in thaihavnn07 ATT YouTube Widget allows Stored XSS. This issue affects ATT YouTube Widget: from n/a through 1.0.
AI Analysis
Technical Summary
CVE-2025-48359 is a high-severity vulnerability classified as CWE-352, indicating a Cross-Site Request Forgery (CSRF) weakness in the thaihavnn07 ATT YouTube Widget, specifically affecting versions up to 1.0. This vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent. The CSRF flaw enables the injection of stored Cross-Site Scripting (XSS) payloads, which can persist within the widget's data. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and impacts confidentiality, integrity, and availability with a scope change (S:C). The CVSS 3.1 base score is 7.1, reflecting a high severity level. The attack vector involves tricking authenticated users into submitting malicious requests that the vulnerable widget processes, leading to stored XSS execution. This can result in session hijacking, credential theft, or further exploitation within the affected web application. No patches are currently available, and no known exploits have been reported in the wild. The vulnerability affects the ATT YouTube Widget developed by thaihavnn07, which is typically used to embed YouTube content in web applications or websites, potentially in content management systems or custom web portals.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those relying on the ATT YouTube Widget to embed video content on their websites or internal portals. Successful exploitation could lead to unauthorized actions performed on behalf of legitimate users, including administrators, resulting in data manipulation, defacement, or unauthorized disclosure of sensitive information. The stored XSS component increases the risk as malicious scripts can persist and affect multiple users, potentially leading to widespread session hijacking or malware distribution. This could damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches due to data leakage), and disrupt business operations. Organizations in sectors such as finance, healthcare, government, and e-commerce, which often embed multimedia content and have stringent data protection requirements, are particularly vulnerable. The requirement for user interaction means phishing or social engineering tactics could be used to trigger the exploit, increasing the attack surface.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. These include disabling or removing the ATT YouTube Widget from all web properties until a secure update is available. Employing Web Application Firewalls (WAFs) with custom rules to detect and block CSRF and XSS attack patterns targeting the widget can reduce risk. Enforce strict Content Security Policies (CSP) to limit the execution of unauthorized scripts and restrict sources of executable content. Implement anti-CSRF tokens and ensure all forms and state-changing requests validate these tokens to prevent unauthorized requests. Conduct thorough code reviews and penetration testing focused on the widget's integration points. Educate users and administrators about phishing risks and suspicious links that could trigger CSRF attacks. Monitor web server and application logs for unusual activities related to the widget. Finally, maintain an inventory of all web components to quickly identify and remediate vulnerable instances once patches become available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-48359: CWE-352 Cross-Site Request Forgery (CSRF) in thaihavnn07 ATT YouTube Widget
Description
Cross-Site Request Forgery (CSRF) vulnerability in thaihavnn07 ATT YouTube Widget allows Stored XSS. This issue affects ATT YouTube Widget: from n/a through 1.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-48359 is a high-severity vulnerability classified as CWE-352, indicating a Cross-Site Request Forgery (CSRF) weakness in the thaihavnn07 ATT YouTube Widget, specifically affecting versions up to 1.0. This vulnerability allows an attacker to perform unauthorized actions on behalf of an authenticated user without their consent. The CSRF flaw enables the injection of stored Cross-Site Scripting (XSS) payloads, which can persist within the widget's data. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and impacts confidentiality, integrity, and availability with a scope change (S:C). The CVSS 3.1 base score is 7.1, reflecting a high severity level. The attack vector involves tricking authenticated users into submitting malicious requests that the vulnerable widget processes, leading to stored XSS execution. This can result in session hijacking, credential theft, or further exploitation within the affected web application. No patches are currently available, and no known exploits have been reported in the wild. The vulnerability affects the ATT YouTube Widget developed by thaihavnn07, which is typically used to embed YouTube content in web applications or websites, potentially in content management systems or custom web portals.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those relying on the ATT YouTube Widget to embed video content on their websites or internal portals. Successful exploitation could lead to unauthorized actions performed on behalf of legitimate users, including administrators, resulting in data manipulation, defacement, or unauthorized disclosure of sensitive information. The stored XSS component increases the risk as malicious scripts can persist and affect multiple users, potentially leading to widespread session hijacking or malware distribution. This could damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches due to data leakage), and disrupt business operations. Organizations in sectors such as finance, healthcare, government, and e-commerce, which often embed multimedia content and have stringent data protection requirements, are particularly vulnerable. The requirement for user interaction means phishing or social engineering tactics could be used to trigger the exploit, increasing the attack surface.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. These include disabling or removing the ATT YouTube Widget from all web properties until a secure update is available. Employing Web Application Firewalls (WAFs) with custom rules to detect and block CSRF and XSS attack patterns targeting the widget can reduce risk. Enforce strict Content Security Policies (CSP) to limit the execution of unauthorized scripts and restrict sources of executable content. Implement anti-CSRF tokens and ensure all forms and state-changing requests validate these tokens to prevent unauthorized requests. Conduct thorough code reviews and penetration testing focused on the widget's integration points. Educate users and administrators about phishing risks and suspicious links that could trigger CSRF attacks. Monitor web server and application logs for unusual activities related to the widget. Finally, maintain an inventory of all web components to quickly identify and remediate vulnerable instances once patches become available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-19T14:41:42.788Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68b0537ead5a09ad006cfcc7
Added to database: 8/28/2025, 1:02:54 PM
Last enriched: 8/28/2025, 1:47:57 PM
Last updated: 8/28/2025, 3:03:32 PM
Views: 2
Related Threats
CVE-2025-9581: Command Injection in Comfast CF-N1
MediumCVE-2025-9584: Command Injection in Comfast CF-N1
MediumCVE-2025-9583: Command Injection in Comfast CF-N1
MediumCVE-2025-9580: OS Command Injection in LB-LINK BL-X26
MediumCVE-2025-9582: Command Injection in Comfast CF-N1
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.