CVE-2025-69771
Arbitrary File Upload in asbplayer Subtitle Loader Enables Code Execution
Publication date: 2026-02-25
Last updated on: 2026-03-20
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| killergerbah | asbplayer | to 1.13.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2025-69771 is a Cross-Site Scripting (XSS) vulnerability found in the asbplayer Chrome extension, specifically affecting versions up to and including 1.13.0.'}, {'type': 'paragraph', 'content': 'The vulnerability occurs in the subtitle loading feature of the extension, where the parsing function improperly handles subtitle text from uploaded .srt files.'}, {'type': 'paragraph', 'content': "Attackers can craft .srt subtitle files containing embedded JavaScript payloads that are not properly sanitized or escaped, causing the scripts to execute within the extension's context."}] [2]
How can this vulnerability impact me? :
This XSS flaw enables attackers to perform actions within the same origin as the streaming service where asbplayer operates, such as Netflix.
- Session hijacking
- Unauthorized API requests
- Leakage of sensitive user information
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves the asbplayer Chrome extension improperly handling crafted .srt subtitle files that contain embedded JavaScript payloads. Detection would involve monitoring for suspicious or unexpected subtitle file uploads or analyzing the content of .srt files for embedded scripts.
Since the vulnerability is related to Cross-Site Scripting (XSS) in subtitle files, one approach is to inspect subtitle files for suspicious tags or scripts before they are loaded by the extension.
No specific detection commands or tools are provided in the available resources.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include avoiding the use of the vulnerable asbplayer Chrome extension version 1.13.0 or earlier, especially avoiding loading subtitle files from untrusted sources.
Developers are recommended to implement strict escaping of HTML tags before inserting subtitle content into the DOM or to use robust sanitization libraries such as DOMPurify to filter out malicious input.
Since no patch or response has been received as of the last update, users should consider disabling or uninstalling the extension until a fix is released.