CVE-2025-13588

Source
https://cve.org/CVERecord?id=CVE-2025-13588
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-13588.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-13588
Published
2025-11-24T07:16:05.287Z
Modified
2026-03-15T22:50:19.564065Z
Severity
  • 2.1 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

A vulnerability was found in lKinderBueno Streamity Xtream IPTV Player up to 2.8. The impacted element is an unknown function of the file public/proxy.php. Performing manipulation results in server-side request forgery. The attack can be initiated remotely. The exploit has been made public and could be used. Upgrading to version 2.8.1 is sufficient to resolve this issue. The patch is named c70bfb8d36b47bfd64c5ec73917e1d9ddb97af92. It is suggested to upgrade the affected component.

References

Affected packages

Git / github.com/lkinderbueno/streamity-xtream-iptv-web-player

Affected ranges

Type
GIT
Repo
https://github.com/lkinderbueno/streamity-xtream-iptv-web-player
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/lkinderbueno/streamity-xtream-iptv-web-player
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*
1.0
1.1
1.1F
2.*
2.3
2.4
2.5
2.6
Other
latest
v2
v2-1
v2.*
v2.1
v2.2
v2.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-13588.json"