CVE-2025-55204

Source
https://cve.org/CVERecord?id=CVE-2025-55204
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-55204.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-55204
Aliases
  • GHSA-gc3f-gqph-522q
Published
2026-01-05T17:37:06.287Z
Modified
2026-01-14T06:46:03.287585Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
muffon has One-click Remote Code Execution via XSS and Custom URL Handling
Details

muffon is a cross-platform music streaming client for desktop. Versions prior to 2.3.0 have a one-click Remote Code Execution (RCE) vulnerability in. An attacker can exploit this issue by embedding a specially crafted muffon:// link on any website they control. When a victim visits the site or clicks the link, the browser triggers Muffon’s custom URL handler, causing the application to launch and process the URL. This leads to RCE on the victim's machine without further interaction. Version 2.3.0 patches the issue.

Database specific
{
    "cwe_ids": [
        "CWE-94"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/55xxx/CVE-2025-55204.json"
}
References

Affected packages

Git / github.com/staniel359/muffon

Affected ranges

Type
GIT
Repo
https://github.com/staniel359/muffon
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.1.0
v0.1.0-alpha
v0.1.0-alpha.1
v0.1.0-alpha.10
v0.1.0-alpha.11
v0.1.0-alpha.12
v0.1.0-alpha.14
v0.1.0-alpha.15
v0.1.0-alpha.2
v0.1.0-alpha.4
v0.1.0-alpha.5
v0.1.0-alpha.6
v0.1.0-alpha.7
v0.1.0-alpha.8
v0.1.0-alpha.9
v0.1.0-beta
v0.1.0-beta.1
v0.2.0
v0.3.0
v1.*
v1.0.0
v1.1.0
v1.2.0
v1.3.0
v1.4.0
v1.5.0
v1.6.0
v2.*
v2.0.0
v2.0.1
v2.0.2
v2.0.3
v2.1.0
v2.2.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-55204.json"