Vulnerability Description
muffon is a cross-platform music streaming client for desktop. Versions prior to 2.3.0 have a one-click Remote Code Execution (RCE) vulnerability in. An attacker can exploit this issue by embedding a specially crafted `muffon://` link on any website they control. When a victim visits the site or clicks the link, the browser triggers Muffon’s custom URL handler, causing the application to launch and process the URL. This leads to RCE on the victim's machine without further interaction. Version 2.3.0 patches the issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Muffon | Muffon | < 2.3.0 |
Related Weaknesses (CWE)
References
- https://drive.google.com/file/d/1eCPCQ6leuVM_vecfofFv04c0t9isCBqR/view?usp=shariExploit
- https://github.com/staniel359/muffon/releases/tag/v2.3.0ProductRelease Notes
- https://github.com/staniel359/muffon/security/advisories/GHSA-gc3f-gqph-522qExploitThird Party Advisory
FAQ
What is CVE-2025-55204?
CVE-2025-55204 is a vulnerability with a CVSS score of 8.8 (HIGH). muffon is a cross-platform music streaming client for desktop. Versions prior to 2.3.0 have a one-click Remote Code Execution (RCE) vulnerability in. An attacker can exploit this issue by embedding a ...
How severe is CVE-2025-55204?
CVE-2025-55204 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-55204?
Check the references section above for vendor advisories and patch information. Affected products include: Muffon Muffon.