Description
A vulnerability was found in lKinderBueno Streamity Xtream IPTV Player up to 2.8. The impacted element is an unknown function of the file public/proxy.php. Performing manipulation results in server-side request forgery. The attack can be initiated remotely. The exploit has been made public and could be used. Upgrading to version 2.8.1 is sufficient to resolve this issue. The patch is named c70bfb8d36b47bfd64c5ec73917e1d9ddb97af92. It is suggested to upgrade the affected component.
Problem types
Product status
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.8.1
Timeline
| 2025-11-23: | Advisory disclosed |
| 2025-11-23: | VulDB entry created |
| 2025-11-23: | VulDB entry last update |
Credits
lakshay12311 (VulDB User)
References
vuldb.com/?id.333352 (VDB-333352 | lKinderBueno Streamity Xtream IPTV Player proxy.php server-side request forgery)
vuldb.com/?ctiid.333352 (VDB-333352 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.687573 (Submit #687573 | lKinderBueno Streamity Xtream IPTV Web player 2.8 Server-Side Request Forgery)
github.com/...hayyverma/CVE-Discovery/blob/main/Streamity.md
github.com/...ommit/c70bfb8d36b47bfd64c5ec73917e1d9ddb97af92
github.com/...ity-Xtream-IPTV-Web-player/releases/tag/v2.8.1