VideoWhisper Live Streaming, CSRF Vulnerability, CVE-2025-48255 (Medium)

Listen to this Post

How the CVE Works:

CVE-2025-48255 is a Cross-Site Request Forgery (CSRF) vulnerability in VideoWhisper’s Broadcast Live Video platform (supporting WebRTC, HLS, RTSP, RTMP). Attackers can craft malicious requests that execute unauthorized actions when an authenticated admin visits a malicious page. Since the application does not validate CSRF tokens, attackers can manipulate streaming settings, hijack sessions, or disrupt broadcasts. The flaw affects versions up to 6.2.4.

DailyCVE Form:

Platform: VideoWhisper Live Streaming
Version: ≤6.2.4
Vulnerability: CSRF
Severity: Medium
Date: 05/29/2025

Prediction: Patch expected by 07/2025

What Undercode Say:

Analytics:

  • Exploitability: Low (requires user interaction)
  • Attack Vector: Network-based
  • Impact: Integrity compromise

Exploit Example (PoC):


<form action="http://target/admin/update_settings" method="POST">
<input type="hidden" name="stream_url" value="attacker-server.com/malicious">
</form>

<script>document.forms[bash].submit();</script>

Protection Commands:

1. WAF Rule (ModSecurity):

SecRule ARGS "@contains update_settings" "id:1001,deny,msg:'CSRF Attempt'"

2. PHP Mitigation:

if ($_SERVER['HTTP_REFERER'] !== 'https://trusted-domain.com') {
die("CSRF Detected");
}

Patch Verification:

curl -I http://target/version | grep "X-CSRF-Token"

References:

  • Patchstack Advisory: PSA-2025-48255
  • NVD CVSS: 6.5 (Medium)

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top