Server-Side Request Forgery in lKinderBueno Streamity Xtream IPTV Player
CVE-2025-13588
Key Information:
- Vendor
Lkinderbueno
- Vendor
- CVE Published:
- 24 November 2025
Badges
What is CVE-2025-13588?
A vulnerability in lKinderBueno Streamity Xtream IPTV Player versions up to 2.8 allows for server-side request forgery due to flaws in the public/proxy.php file. Attackers can remotely exploit this weakness, resulting in unauthorized server requests. To mitigate this risk, users should upgrade to version 2.8.1, which addresses the issue. The corresponding patch has been documented and is available on the vendor's release notes.
Affected Version(s)
Streamity Xtream IPTV Player 2.0
Streamity Xtream IPTV Player 2.1
Streamity Xtream IPTV Player 2.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
