Skip to main content

CVE-2025-8435: Missing Authorization in code-projects Online Movie Streaming

Medium
VulnerabilityCVE-2025-8435cvecve-2025-8435
Published: Fri Aug 01 2025 (08/01/2025, 04:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Movie Streaming

Description

A vulnerability was found in code-projects Online Movie Streaming 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin-control.php. The manipulation of the argument ID leads to missing authorization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/01/2025, 05:03:14 UTC

Technical Analysis

CVE-2025-8435 is a critical security vulnerability identified in version 1.0 of the code-projects Online Movie Streaming platform. The vulnerability arises from a missing authorization check in the /admin-control.php file, specifically related to the manipulation of the 'ID' argument. This flaw allows an unauthenticated remote attacker to bypass authorization controls, potentially gaining unauthorized access to administrative functionalities. The vulnerability does not require any privileges or user interaction to exploit, making it remotely exploitable over the network. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with the vector highlighting network attack vector (AV:N), low attack complexity (AC:L), no authentication required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is rated as low to medium, suggesting that while the attacker can access or manipulate some administrative functions, the overall damage scope might be limited or partial. The exploit has been publicly disclosed but there are no known exploits actively used in the wild at the time of reporting. The absence of patches or mitigation links indicates that the vendor has not yet released an official fix, increasing the urgency for organizations to implement interim protective measures. This vulnerability is particularly concerning because administrative access can lead to further compromise, including data leakage, service disruption, or unauthorized configuration changes within the streaming platform environment.

Potential Impact

For European organizations using the code-projects Online Movie Streaming 1.0 platform, this vulnerability poses a significant risk. Unauthorized administrative access could lead to manipulation of streaming content, user data exposure, or disruption of service availability, impacting customer trust and regulatory compliance, especially under GDPR mandates. The ability to exploit this remotely without authentication increases the attack surface, potentially allowing threat actors to pivot into broader internal networks if the streaming platform is integrated with other enterprise systems. This could result in reputational damage, financial losses, and legal consequences. The medium CVSS score suggests that while the vulnerability is serious, the impact might be contained if the platform is isolated or has additional security controls. However, organizations relying on this software for customer-facing services or internal use should consider the risk critical due to the administrative access implications and the lack of available patches.

Mitigation Recommendations

Given the absence of an official patch, European organizations should immediately implement compensating controls. These include restricting network access to the /admin-control.php endpoint via firewall rules or web application firewalls (WAF) to allow only trusted IP addresses. Implement strong network segmentation to isolate the streaming platform from critical internal systems. Enable detailed logging and monitoring of all access attempts to the admin interface to detect suspicious activity promptly. If possible, disable or restrict the use of the vulnerable functionality until a patch is available. Conduct a thorough review of user permissions and remove any unnecessary administrative privileges. Additionally, organizations should engage with the vendor for updates on patch releases and consider applying virtual patching techniques through WAF rules to block exploitation attempts. Regular vulnerability scanning and penetration testing focused on this endpoint can help identify exploitation attempts or residual risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-31T18:52:43.915Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 688c46f1ad5a09ad00c4fdb3

Added to database: 8/1/2025, 4:47:45 AM

Last enriched: 8/1/2025, 5:03:14 AM

Last updated: 8/2/2025, 12:13:47 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats