CVE-2025-66723: n/a
inMusic Brands Engine DJ before 4.3.4 suffers from Insecure Permissions due to exposed HTTP service in the Remote Library, which allows attackers to access all files and network paths.
AI Analysis
Technical Summary
CVE-2025-66723 is a vulnerability identified in inMusic Brands Engine DJ software versions prior to 4.3.4. The root cause is insecure permissions stemming from an exposed HTTP service within the Remote Library feature. This exposure allows remote attackers to access all files and network paths available to the service without requiring any authentication or user interaction. The vulnerability is classified under CWE-732 (Incorrect Permission Assignment for Critical Resource), indicating that the software improperly restricts access to sensitive resources. The CVSS 3.1 base score is 7.5, reflecting a network attack vector with low attack complexity, no privileges required, and no user interaction needed. The impact is primarily on confidentiality, as attackers can read sensitive files and potentially map network shares, which could facilitate further lateral movement or data exfiltration. No integrity or availability impacts are noted. Although no public exploits have been reported yet, the ease of exploitation and the broad access granted make this a critical concern for affected users. The lack of available patches at the time of reporting means organizations must rely on interim mitigations until an update is released.
Potential Impact
For European organizations, the exposure of sensitive files and network paths can lead to significant data breaches, intellectual property theft, and potential exposure of personal data protected under GDPR. Industries such as music production, event management, and entertainment technology—where Engine DJ software is commonly used—are at heightened risk. Attackers could leverage this vulnerability to gain insights into network architecture or harvest credentials stored in accessible files, enabling further compromise. The confidentiality breach could damage brand reputation, lead to regulatory fines, and disrupt business operations. Since the vulnerability does not affect integrity or availability directly, the immediate operational impact may be limited, but the long-term consequences of data exposure are severe. European organizations with remote or cloud-based deployments of Engine DJ are particularly vulnerable due to the network-exposed HTTP service.
Mitigation Recommendations
1. Immediately restrict network access to the Remote Library HTTP service using firewalls or network segmentation to limit exposure to trusted hosts only. 2. Implement strict access controls and authentication mechanisms around the HTTP service if possible, even before official patches are available. 3. Monitor network traffic for unusual access patterns to the Remote Library service to detect potential exploitation attempts. 4. Regularly audit file permissions and network shares on systems running Engine DJ to ensure no unintended exposure. 5. Plan and prioritize upgrading to version 4.3.4 or later as soon as the patch is released by inMusic Brands. 6. Educate IT and security teams about this vulnerability to ensure rapid response and containment. 7. Consider deploying host-based intrusion detection systems (HIDS) to alert on unauthorized file access attempts related to this service.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy
CVE-2025-66723: n/a
Description
inMusic Brands Engine DJ before 4.3.4 suffers from Insecure Permissions due to exposed HTTP service in the Remote Library, which allows attackers to access all files and network paths.
AI-Powered Analysis
Technical Analysis
CVE-2025-66723 is a vulnerability identified in inMusic Brands Engine DJ software versions prior to 4.3.4. The root cause is insecure permissions stemming from an exposed HTTP service within the Remote Library feature. This exposure allows remote attackers to access all files and network paths available to the service without requiring any authentication or user interaction. The vulnerability is classified under CWE-732 (Incorrect Permission Assignment for Critical Resource), indicating that the software improperly restricts access to sensitive resources. The CVSS 3.1 base score is 7.5, reflecting a network attack vector with low attack complexity, no privileges required, and no user interaction needed. The impact is primarily on confidentiality, as attackers can read sensitive files and potentially map network shares, which could facilitate further lateral movement or data exfiltration. No integrity or availability impacts are noted. Although no public exploits have been reported yet, the ease of exploitation and the broad access granted make this a critical concern for affected users. The lack of available patches at the time of reporting means organizations must rely on interim mitigations until an update is released.
Potential Impact
For European organizations, the exposure of sensitive files and network paths can lead to significant data breaches, intellectual property theft, and potential exposure of personal data protected under GDPR. Industries such as music production, event management, and entertainment technology—where Engine DJ software is commonly used—are at heightened risk. Attackers could leverage this vulnerability to gain insights into network architecture or harvest credentials stored in accessible files, enabling further compromise. The confidentiality breach could damage brand reputation, lead to regulatory fines, and disrupt business operations. Since the vulnerability does not affect integrity or availability directly, the immediate operational impact may be limited, but the long-term consequences of data exposure are severe. European organizations with remote or cloud-based deployments of Engine DJ are particularly vulnerable due to the network-exposed HTTP service.
Mitigation Recommendations
1. Immediately restrict network access to the Remote Library HTTP service using firewalls or network segmentation to limit exposure to trusted hosts only. 2. Implement strict access controls and authentication mechanisms around the HTTP service if possible, even before official patches are available. 3. Monitor network traffic for unusual access patterns to the Remote Library service to detect potential exploitation attempts. 4. Regularly audit file permissions and network shares on systems running Engine DJ to ensure no unintended exposure. 5. Plan and prioritize upgrading to version 4.3.4 or later as soon as the patch is released by inMusic Brands. 6. Educate IT and security teams about this vulnerability to ensure rapid response and containment. 7. Consider deploying host-based intrusion detection systems (HIDS) to alert on unauthorized file access attempts related to this service.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-08T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695450a0db813ff03e2bda7b
Added to database: 12/30/2025, 10:22:24 PM
Last enriched: 1/6/2026, 11:53:37 PM
Last updated: 1/7/2026, 4:12:44 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.