CVE-2025-13803
BaseFortify
Publication date: 2025-12-01
Last updated on: 2025-12-01
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mediacrush | mediacrush | 1.0.1 |
| mediacrush | mediacrush | 1.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-644 | The product does not neutralize or incorrectly neutralizes web scripting syntax in HTTP headers that can be used by web browser components that can process raw headers, such as Flash. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in MediaCrush versions 1.0.0 and 1.0.1 in the Header Handler component, specifically in an unknown function within the file /mediacrush/paths.py. It involves improper neutralization of HTTP headers related to the Host argument, which can be manipulated remotely to exploit scripting syntax issues.
How can this vulnerability impact me? :
The vulnerability can be exploited remotely to manipulate HTTP headers, potentially leading to security issues such as injection attacks or other scripting-related exploits. This can compromise the confidentiality, integrity, and availability of the affected system.