Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sun, 21 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Streama Project
Streama Project streama |
|
| Vendors & Products |
Streama Project
Streama Project streama |
Thu, 18 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Streama versions 1.10.0 through 1.10.5 and prior to commit b7c8767 contain a combination of path traversal and server-side request forgery (SSRF) vulnerabilities in that allow an authenticated attacker to write arbitrary files to the server filesystem. The issue exists in the subtitle download functionality, where user-controlled parameters are used to fetch remote content and construct file paths without proper validation. By supplying a crafted subtitle download URL and a path traversal sequence in the file name, an attacker can write files to arbitrary locations on the server, potentially leading to remote code execution. | |
| Title | Streama Subtitle Download Path Traversal and SSRF Leading to Arbitrary File Write | |
| Weaknesses | CWE-22 CWE-918 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-23T15:43:54.838Z
Reserved: 2025-04-15T19:15:22.603Z
Link: CVE-2025-34452
Updated: 2025-12-18T21:59:36.676Z
Status : Deferred
Published: 2025-12-18T22:15:56.473
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-34452
No data.
OpenCVE Enrichment
Updated: 2025-12-21T21:14:57Z