Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69771: n/a

0
Critical
VulnerabilityCVE-2025-69771cvecve-2025-69771
Published: Wed Feb 25 2026 (02/25/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross-Site Scripting (XSS) vulnerability in the subtitle loading function of the asbplayer Chrome Extension version 1.14.0 allows attackers to execute arbitrary JavaScript in the context of the active streaming platform via a crafted .srt subtitle file. Because the script executes within the same-site context, it can bypass cross-origin restrictions, leading to unauthorized same-site API requests and session data exfiltration.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 21:42:55 UTC

Technical Analysis

CVE-2025-69771 is a high-severity Cross-Site Scripting (XSS) vulnerability affecting the asbplayer Chrome Extension version 1.14.0. The flaw resides in the subtitle loading functionality, which processes .srt subtitle files. An attacker can craft a malicious subtitle file containing embedded JavaScript code that executes when loaded by the extension. Because the script executes within the same-site context of the streaming platform, it can bypass standard cross-origin protections enforced by browsers. This allows the attacker to perform unauthorized same-site API requests, potentially manipulating user data or the streaming service's state, and to exfiltrate sensitive session information such as authentication tokens or cookies. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), indicating that the extension does not properly sanitize or validate subtitle file contents before processing. The CVSS v3.1 base score is 9.6 (critical), reflecting network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and high impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild and no patches are currently available, the risk is significant due to the potential for session hijacking and unauthorized actions within streaming platforms. The vulnerability highlights the dangers of processing user-supplied files without adequate validation and the risks posed by browser extensions with elevated privileges.

Potential Impact

The impact of CVE-2025-69771 is substantial for both individual users and organizations relying on the asbplayer Chrome Extension for streaming services. Exploitation can lead to unauthorized access to sensitive session data, including authentication tokens and cookies, enabling attackers to impersonate users or hijack streaming sessions. This compromises user confidentiality and integrity of the streaming experience. Attackers can also perform unauthorized API requests within the same-site context, potentially altering user data or service state, leading to data corruption or service disruption. The availability of the streaming service could be affected if attackers manipulate session states or cause crashes via malicious scripts. For organizations, this vulnerability could lead to data breaches, loss of user trust, and potential regulatory consequences if personal data is exposed. The requirement for user interaction (loading a malicious subtitle file) somewhat limits mass exploitation but targeted attacks against high-value users or organizations remain a serious concern. The lack of patches increases the window of exposure, emphasizing the urgency of mitigation.

Mitigation Recommendations

To mitigate CVE-2025-69771, users and organizations should immediately cease using the asbplayer Chrome Extension version 1.14.0 until an official patch is released. Avoid loading subtitle files from untrusted or unknown sources, especially .srt files received via email, messaging platforms, or third-party websites. Network administrators can implement Content Security Policies (CSP) to restrict script execution contexts and limit the extension's ability to perform unauthorized API calls. Monitoring network traffic for unusual same-site API requests originating from browser extensions can help detect exploitation attempts. Developers of the extension should implement strict input validation and sanitization for subtitle files, ensuring that any embedded scripts or executable content are neutralized before processing. Additionally, adopting a least-privilege approach in extension permissions can reduce the attack surface. Users should keep their browsers and extensions updated and consider using alternative, more secure subtitle handling solutions until this vulnerability is resolved.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699f6e70b7ef31ef0b5a0a22

Added to database: 2/25/2026, 9:49:36 PM

Last enriched: 3/20/2026, 9:42:55 PM

Last updated: 4/12/2026, 2:22:16 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses